Abstract is missing.
- Juice: A Longitudinal Study of an SEO BotnetDavid Y. Wang, Stefan Savage, Geoffrey M. Voelker. [doi]
- Macroeconomic Analysis of MalwareVaibhav Garg, L. Jean Camp. [doi]
- InteGuard: Toward Automatic Protection of Third-Party Web Service IntegrationsLuyi Xing, Yangyi Chen, Xiaofeng Wang, Shuo Chen. [doi]
- An Empirical Evaluation of Relay Selection in TorChris Wacek, Henry Tan, Kevin Bauer, Micah Sherr. [doi]
- Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, Chiara Petrioli. [doi]
- FRESCO: Modular Composable Security Services for Software-Defined NetworksSeungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson. [doi]
- One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art CryptographyTibor Jager, Kenneth G. Paterson, Juraj Somorovsky. [doi]
- Preserving Link Privacy in Social Network Based SystemsPrateek Mittal, Charalampos Papamanthou, Dawn Xiaodong Song. [doi]
- Clear and Present Data: Opaque Traffic and its Security Implications for the FutureAndrew M. White 0002, Srinivas Krishnan, Michael Bailey, Fabian Monrose, Phillip A. Porras. [doi]
- You Can't Do Today's Security With Yesterday's MethodsJoe Sullivan. [doi]
- ObliviStore: High Performance Oblivious Distributed Cloud Data StoreEmil Stefanov, Elaine Shi. [doi]
- Preventing Side-Channel Leaks in Web Traffic: A Formal ApproachMichael Backes, Goran Doychev, Boris Köpf. [doi]
- COMPA: Detecting Compromised Accounts on Social NetworksManuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna. [doi]
- Detection of Malicious PDF Files Based on Hierarchical Document StructureNedim Srndic, Pavel Laskov. [doi]
- High Accuracy Attack Provenance via Binary-based Execution PartitionKyu Hyung Lee, Xiangyu Zhang, Dongyan Xu. [doi]
- A Practical, Targeted, and Stealthy Attack Against WPA Enterprise AuthenticationAldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir. [doi]
- Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the WebDavide Canali, Davide Balzarotti. [doi]
- Taming Hosted Hypervisors with (Mostly) Deprivileged ExecutionChiachih Wu, Zhi Wang, Xuxian Jiang. [doi]
- Intention and Origination: An Inside Look at Large-Scale Bot QueriesJunjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee. [doi]
- LIRA: Lightweight Incentivized Routing for AnonymityRob Jansen, Aaron Johnson, Paul F. Syverson. [doi]
- The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 WebsitesSooel Son, Vitaly Shmatikov. [doi]
- Comparing Mobile Privacy Protection through Cross-Platform ApplicationsJin Han, Qiang Yan, Debin Gao, Jianying Zhou, Robert H. Deng. [doi]
- Toward Online Verification of Client Behavior in Distributed ApplicationsRobert A. Cochran, Michael K. Reiter. [doi]
- PlaceRaider: Virtual Theft in Physical Spaces with SmartphonesRobert Templeman, Zahid Rahman, David J. Crandall, Apu Kapadia. [doi]
- Unobservable Re-authentication for SmartphonesLingjun Li, Xinxin Zhao, Guoliang Xue. [doi]
- Detecting Passive Content Leaks and Pollution in Android ApplicationsYajin Zhou, Xuxian Jiang. [doi]
- One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block QueriesRyan Henry, Yizhou Huang, Ian Goldberg. [doi]
- I can be You: Questioning the use of Keystroke Dynamics as BiometricsChee Meng Tey, Payas Gupta, Debin Gao. [doi]
- How Privacy Leaks From Bluetooth Mouse?Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang 0004, Xinwen Fu. [doi]
- On Implementing Deniable Storage Encryption for Mobile DevicesAdam Skillen, Mohammad Mannan. [doi]
- Automatic Protocol Selection in Secure Two-Party ComputationsFlorian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer. [doi]
- Privacy-Enhancing Technologies for Medical Tests Using Genomic DataErman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux. [doi]
- KinWrite: Handwriting-Based Authentication Using KinectJing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang. [doi]
- Verito: A Practical System for Transparency and Accountability in Virtual EconomiesRaghav Bhaskar, Saikat Guha, Srivatsan Laxman, Prasad Naldurg. [doi]
- Laying a Secure Foundation for Mobile DevicesStephen Smalley. [doi]
- A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentialityDavid Irakiza, Md E. Karim, Vir V. Phoha. [doi]
- Social Turing Tests: Crowdsourcing Sybil DetectionGang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao. [doi]
- NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference SystemJialong Zhang, Guofei Gu. [doi]
- Assessing software integrity of virtual appliances through software whitelistsJun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell. [doi]
- General Chair's MessageThomas Hutton. [doi]
- Attack Surface Metrics and Automated Compile-Time OS Kernel TailoringAnil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schröder-Preikschat, Daniel Lohmann, Rüdiger Kapitza. [doi]
- Tailing RFID Tags for Clone DetectionDavide Zanetti, Srdjan Capkun, Ari Juels. [doi]
- Analyzing Unique-Bid Auction Sites for Fun and ProfitOry Samorodnitzky, Eran Tromer, Avishai Wool. [doi]
- 20 Years of Network and Distributed Systems Security: The Good, the Bad, and the UglyRichard A. Kemmerer. [doi]
- rBridge: User Reputation based Tor Bridge Distribution with Privacy PreservationQiyan Wang, Zi Lin, Nikita Borisov, Nicholas Hopper. [doi]
- Program Chair's MessagePeng Ning. [doi]
- Contextual Policy Enforcement in Android Applications with Permission Event GraphsKevin Zhijie Chen, Noah M. Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Tom Magrino, Edward XueJun Wu, Martin Rinard, Dawn Xiaodong Song. [doi]
- Fix Me Up: Repairing Access-Control Bugs in Web ApplicationsSooel Son, Kathryn S. McKinley, Vitaly Shmatikov. [doi]
- I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumventionAmir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer. [doi]
- Automatically Inferring the Evolution of Malicious Activity on the InternetShobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck. [doi]
- TransBlocker: Transforming and Taming Privacy-Breaching Android ApplicationsMu Zhang, Heng Yin. [doi]
- When Firmware Modifications Attack: A Case Study of Embedded ExploitationAng Cui, Michael Costello, Salvatore J. Stolfo. [doi]
- Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical AttacksHassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk. [doi]
- Security Enhanced (SE) Android: Bringing Flexible MAC to AndroidStephen Smalley, Robert Craig. [doi]
- OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance [doi]
- AUTHSCAN: Automatic Extraction of Web Authentication Protocols from ImplementationsGuangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun 0001, Yang Liu 0003, Jin Song Dong. [doi]
- Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click HostingTobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel. [doi]
- Metrics for Automated Network Security DesignMohammad Ashiqur Rahman, Ehab Al-Shaer. [doi]
- Practical Timing Side Channel Attacks Against Kernel Space ASLRRalf Hund, Carsten Willems, Thorsten Holz. [doi]
- The Core of the Matter: Analyzing Malicious Traffic in Cellular CarriersCharles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee. [doi]
- Secure Computation on Floating Point NumbersMehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele. [doi]
- CAMP: Content-Agnostic Malware ProtectionMoheeb Abu Rajab, Lucas Ballard, Noe Lutz, Panayiotis Mavrommatis, Niels Provos. [doi]
- Updates from the Internet BackboneMatthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller. [doi]
- Pisces: Anonymous Communication Using Social NetworksPrateek Mittal, Matthew Wright, Nikita Borisov. 1-18 [doi]