Abstract is missing.
- Dynamic Searchable Encryption in Very-Large Databases: Data Structures and ImplementationDavid Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner. [doi]
- Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware WarningsAjaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, Rajesh Kana. [doi]
- ROPecker: A Generic and Practical Approach For Defending Against ROP AttacksYueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, Robert H. Deng. [doi]
- Toward Black-Box Detection of Logic Flaws in Web ApplicationsGiancarlo Pellegrino, Davide Balzarotti. [doi]
- The Tangled Web of Password ReuseAnupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, Xiaofeng Wang. [doi]
- Nazca: Detecting Malware Distribution in Large-Scale NetworksLuca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia. [doi]
- Detecting Logic Vulnerabilities in E-commerce ApplicationsFangqi Sun, Liang Xu, Zhendong Su. [doi]
- From Very Weak to Very Strong: Analyzing Password-Strength MetersXavier de Carne' de Carnavalet, Mohammad Mannan. [doi]
- Scambaiter: Understanding Targeted Nigerian Scams on CraigslistYoungsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson. [doi]
- Leveraging USB to Establish Host Identity Using Commodity DevicesAdam M. Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler. [doi]
- Authentication Using Pulse-Response BiometricsKasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik. [doi]
- AirBag: Boosting Smartphone Resistance to Malware InfectionChiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang. [doi]
- DREBIN: Effective and Explainable Detection of Android Malware in Your PocketDaniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck. [doi]
- CyberProbe: Towards Internet-Scale Active Detection of Malicious ServersAntonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, Guofei Gu. [doi]
- On the Mismanagement and Maliciousness of NetworksJing Zhang, Zakir Durumeric, Michael Bailey, Mingyan Liu, Manish Karir. [doi]
- Practical Issues with TLS Client Certificate AuthenticationArnis Parsovs. [doi]
- Gyrus: A Framework for User-Intent Monitoring of Text-based Networked ApplicationsYeongjin Jang, Simon P. Chung, Bryan D. Payne, Wenke Lee. [doi]
- Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android ApplicationsSebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. [doi]
- The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor NetworkRob Jansen, Florian Tschorsch, Aaron Johnson, Björn Scheuermann. [doi]
- Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth DevicesMaliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan. [doi]
- Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training MemoizationAlireza Saberi, Yangchun Fu, Zhiqiang Lin. [doi]
- On Semantic Patterns of Passwords and their Security ImpactRafael Veras, Christopher Collins, Julie Thorpe. [doi]
- Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application FrameworksMartin Georgiev, Suman Jana, Vitaly Shmatikov. [doi]
- Auditable Version Control SystemsBo Chen, Reza Curtmola. [doi]
- Decentralized Anonymous CredentialsChristina Garman, Matthew Green 0001, Ian Miers. [doi]
- SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android AppsDavid Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan. [doi]
- Hardening Persona - Improving Federated Web LoginMichael Dietz, Dan S. Wallach. [doi]
- Privacy-Preserving Distributed Stream MonitoringArik Friedman, Izchak Sharfman, Daniel Keren, Assaf Schuster. [doi]
- Enhanced Certificate Transparency and End-to-End Encrypted MailMark D. Ryan. [doi]
- Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO SystemsMatthias Schulz, Adrian Loch, Matthias Hollick. [doi]
- Power Attack: An Increasing Threat to Data CentersZhang Xu, Haining Wang, Zichen Xu, Xiaorui Wang. [doi]
- Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on AndroidMuhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, Xiaofeng Wang, Carl A. Gunter. [doi]
- SafeDispatch: Securing C++ Virtual Calls from Memory Corruption AttacksDongseok Jang, Zachary Tatlock, Sorin Lerner. [doi]
- Persistent Data-only Malware: Function Hooks without CodeSebastian Vogl, Jonas Pfoh, Thomas Kittel, Claudia Eckert. [doi]
- A Trusted Safety Verifier for Process Controller CodeStephen E. McLaughlin, Saman A. Zonouz, Devin J. Pohly, Patrick Drew McDaniel. [doi]
- AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android ApplicationsMu Zhang, Heng Yin. [doi]
- Botcoin: Monetizing Stolen CyclesDanny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko. [doi]
- A Machine-learning Approach for Classifying and Categorizing Android Sources and SinksSiegfried Rasthofer, Steven Arzt, Eric Bodden. [doi]
- Screenmilker: How to Milk Your Android Screen for SecretsChia-Chi Lin, Hongyang Li, Xiao-yong Zhou, Xiaofeng Wang. [doi]
- Smartphones as Practical and Secure Location Verification Tokens for PaymentsClaudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun. [doi]
- PlaceAvoider: Steering First-Person Cameras away from Sensitive SpacesRobert Templeman, Mohammed Korayem, David J. Crandall, Apu Kapadia. [doi]
- DSpin: Detecting Automatically Spun Content on the WebQing Zhang, David Y. Wang, Geoffrey M. Voelker. [doi]
- Practical Dynamic Searchable Encryption with Small LeakageEmil Stefanov, Charalampos Papamanthou, Elaine Shi. [doi]
- Selling off User Privacy at AuctionLukasz Olejnik, Minh-Dung Tran, Claude Castelluccia. [doi]
- Amplification Hell: Revisiting Network Protocols for DDoS AbuseChristian Rossow. [doi]
- Simulation of Built-in PHP Features for Precise Static Code AnalysisJohannes Dahse, Thorsten Holz. [doi]
- Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the CloudArnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark Lentczner. [doi]
- No Direction Home: The True Cost of Routing Around DecoysAmir Houmansadr, Edmund L. Wong, Vitaly Shmatikov. [doi]
- AccelPrint: Imperfections of Accelerometers Make Smartphones TrackableSanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, Srihari Nelakuditi. [doi]
- Efficient Private File Retrieval by Combining ORAM and PIRTravis Mayberry, Erik-Oliver Blass, Agnes Hui Chan. [doi]
- AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' FirmwaresJonas Zaddach, Luca Bruno, Aurélien Francillon, Davide Balzarotti. [doi]
- Privacy through Pseudonymity in Mobile Telephony SystemsMyrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan. [doi]
- Web PKI: Closing the Gap between Guidelines and PracticesAntoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie, Microsoft Research. [doi]
- Gaining Control of Cellular Traffic Accounting by Spurious TCP RetransmissionYounghwan Go, Eunyoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune, KyoungSoo Park. [doi]
- Copker: Computing with Private Keys without RAMLe Guan, Jingqiang Lin, Bo Luo, Jiwu Jing. [doi]