Abstract is missing.
- FineDroid: Enforcing Permissions with System-Wide Application Execution ContextYuan Zhang, Min Yang, Guofei Gu, Hao Chen. 3-22 [doi]
- Detection, Classification and Characterization of Android Malware Using API Data DependencyYongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao. 23-40 [doi]
- KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile DevicesAndré Ebert, Chadly Marouane, Benno Rott, Martin Werner 0001. 41-57 [doi]
- Using Provenance Patterns to Vet Sensitive Behaviors in Android AppsChao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu. 58-77 [doi]
- SplitDroid: Isolated Execution of Sensitive Components for Mobile ApplicationsLin Yan, Yao Guo, Xiangqun Chen. 78-96 [doi]
- Intrinsic Code Attestation by Instruction Chaining for Embedded DevicesOliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander. 97-115 [doi]
- Defeating Kernel Driver PurifierJidong Xiao, Hai Huang, Haining Wang. 116-134 [doi]
- Kernel Data Attack Is a Realistic Security ThreatJidong Xiao, Hai Huang, Haining Wang. 135-154 [doi]
- RScam: Cloud-Based Anti-Malware via Reversible SketchHao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen. 157-174 [doi]
- TADOOP: Mining Network Traffic Anomalies with HadoopGeng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu. 175-192 [doi]
- SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External ServicesYueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen. 193-211 [doi]
- Authenticating Top-k Results of Secure Multi-keyword Search in Cloud ComputingXiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu. 212-229 [doi]
- Resource Efficient Privacy Preservation of Online Social Media ConversationsIndrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy. 233-255 [doi]
- Uranine: Real-time Privacy Leakage Monitoring without System Modification for AndroidVaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen. 256-276 [doi]
- Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded SystemsHong Liu, Hongmin Li, Eugene Y. Vasserman. 277-293 [doi]
- Remote Activation of Hardware Trojans via a Covert Temperature ChannelPriyabrat Dash, Chris Perkins, Ryan M. Gerdes. 294-310 [doi]
- Route Leaks Identification by Detecting Routing LoopsSong Li, Hai-Xin Duan, Zhiliang Wang, Xing Li. 313-329 [doi]
- Pulsar: Stateful Black-Box Fuzzing of Proprietary Network ProtocolsHugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck. 330-347 [doi]
- You Are How You Query: Deriving Behavioral Fingerprints from DNS TrafficDae-Wook Kim, Junjie Zhang. 348-366 [doi]
- Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath RoutingLei Yang, FengJun Li. 367-384 [doi]
- An Improved Method for Anomaly-Based Network Scan DetectionAshton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier. 385-400 [doi]
- Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoSJuan D. Parra Rodriguez, Joachim Posegga. 401-417 [doi]
- An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast CommunicationsChunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun. 418-437 [doi]
- Generation of Transmission Control Rules Compliant with Existing Access Control PoliciesYoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill. 438-455 [doi]
- A Markov Random Field Approach to Automated Protocol Signature InferenceYongzheng Zhang 0002, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang. 459-476 [doi]
- How to Prevent to Delegate AuthenticationMohsen Alimomeni, Reihaneh Safavi-Naini. 477-499 [doi]
- Ciphertext-Policy Attribute-Based Encryption with User and Authority AccountabilityXing Zhang, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu. 500-518 [doi]
- A Decentralized Access Control Model for Dynamic Collaboration of Autonomous PeersStefan Craß, Gerson Joskowicz, eva Kühn. 519-537 [doi]
- Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber AttacksGustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar. 538-555 [doi]
- POSTER: API-Level Multi-policy Access Control Enforcement for Android MiddlewareDongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng. 559-562 [doi]
- POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering InfrastructureVitaly Ford, Ambareen Siraj. 563-566 [doi]
- POSTER: A Security Adaptive Steganography System Applied on Digital AudioXuejie Ding, Wei-qing Huang, Meng Zhang, Jianlin Zhao. 567-571 [doi]
- POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event PathsYongbo Li, Fan Yao, Tian Lan, Guru Venkataramani. 572-576 [doi]
- POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial NetworksApala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund. 577-580 [doi]
- POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement SystemsKai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou. 581-584 [doi]
- POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE CiphertextsYuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu. 585-589 [doi]
- POSTER: Context-Adaptive User-Centric Privacy Scheme for VANETKarim Emara, Wolfgang Woerndl, Johann H. Schlichter. 590-593 [doi]
- POSTER: A Collaborative Approach on Behavior-Based Android Malware DetectionChanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin. 594-597 [doi]
- POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power AnalysisDegang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai. 598-601 [doi]
- Securing Application with Software Partitioning: A Case Study Using SGXAhmad Atamli-Reineh, Andrew Martin. 605-621 [doi]
- Image Spam Classification Using Neural NetworkMozammel Chowdhury, Junbin Gao, Morshed Chowdhury. 622-632 [doi]
- An Effective t-way Test Data Generation StrategyKhandakar Rabbi, Quazi Mamun. 633-648 [doi]
- A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic ClusteringAla' Aburumman, Wei Jye Seo, Md. Rafiqul Islam 0001, Muhammad Khurram Khan, Kim-Kwang Raymond Choo. 649-664 [doi]
- Community-Based Collaborative Intrusion DetectionCarlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer. 665-681 [doi]
- A Novel Clustering Algorithm for Database Anomaly DetectionJinkun Geng, Daren Ye, Ping Luo, Pin Lv. 682-696 [doi]
- Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless NetworksM. Arif Khan, Rafiqul Islam. 697-710 [doi]
- Human Surveillance System for Security ApplicationMozammel Chowdhury, Junbin Gao, Rafiqul Islam. 711-724 [doi]
- Security Considerations for Wireless Carrier Agonistic Bio-Monitoring SystemsBen Townsend, Jemal Abawajy. 725-737 [doi]