Abstract is missing.
- AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App ManagementZhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen, Wangjun Hong. 3-23 [doi]
- H-Binder: A Hardened Binder Framework on Android SystemsDong Shen, Zhangkai Zhang, Xuhua Ding, Zhoujun Li, Robert H. Deng. 24-43 [doi]
- Exploiting Android System Services Through Bypassing Service HelpersYacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su. 44-62 [doi]
- Secure Keyboards Against Motion Based Keystroke Inference AttackShaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong. 63-81 [doi]
- Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular CommunicationsJianbing Ni, Kuan Zhang, Xiaodong Lin, Yong Yu, Xuemin (Sherman) Shen. 85-103 [doi]
- TruSDN: Bootstrapping Trust in Cloud Network InfrastructureNicolae Paladi, Christian Gehrmann. 104-124 [doi]
- Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train CommunicationsSang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu. 125-143 [doi]
- Faulty Node Repair and Dynamically Spawned Black Hole SearchWei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft. 144-162 [doi]
- Attribute-Based Encryption with Granular RevocationHui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li. 165-181 [doi]
- Tokenisation Blacklisting Using Linkable Group SignaturesAssad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis. 182-198 [doi]
- Privacy-Preserving Multi-pattern MatchingTao Zhang, Xiuhua Wang, Sherman S. M. Chow. 199-218 [doi]
- Parallel and Dynamic Structured EncryptionRussell W. F. Lai, Sherman S. M. Chow. 219-238 [doi]
- Secure IoT Using Weighted Signed GraphsPinaki Sarkar, Morshed Uddin Chowdhury. 241-256 [doi]
- A Multi-protocol Security Framework to Support Internet of ThingsBiplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy. 257-270 [doi]
- Tinder Me Softly - How Safe Are You Really on Tinder?Mark Carman, Kim-Kwang Raymond Choo. 271-286 [doi]
- Biometric Authentication Using Facial RecognitionMozammel Chowdhury, Junbin Gao, Rafiqul Islam. 287-295 [doi]
- Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating StrategyFidel Ikundi, Rafiqul Islam, Peter White. 296-304 [doi]
- Architecture Support for Controllable VMI on Untrusted CloudJiangyong Shi, Yuexiang Yang. 307-316 [doi]
- IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data LeakageTianjun Wu, Yuexiang Yang. 317-333 [doi]
- A Multi-layer Model to Detect Spam Email at Client SideKamini (Simi) Bajaj. 334-349 [doi]
- Access Control Management for Secure Cloud StorageEnrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati. 353-372 [doi]
- Attribution of Economic Denial of Sustainability Attacks in Public CloudsMohammad Karami, Songqing Chen. 373-391 [doi]
- A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors ProblemLing Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan. 392-411 [doi]
- ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical EnvironmentsLorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo. 412-428 [doi]
- Website Forensic Investigation to Identify Evidence and Impact of CompromiseYuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto. 431-453 [doi]
- SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential PrivacyQian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren. 454-474 [doi]
- A Behavioral Biometrics Based Approach to Online Gender ClassificationNicolas Van Balen, Christopher T. Ball, Haining Wang. 475-495 [doi]
- Unique on the Road: Re-identification of Vehicular Location-Based MetadataZheng Xiao, Cheng Wang, Weili Han, Changjun Jiang. 496-513 [doi]
- BinDNN: Resilient Function Matching Using Deep LearningNathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel. 517-537 [doi]
- TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated EnvironmentYanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi. 538-556 [doi]
- SQLite Forensic Analysis Based on WALYao Liu, Ming Xu, Jian Xu, Ning Zheng, Xiaodong Lin. 557-574 [doi]
- Impact of Environment on Branch Transfer of SoftwareJianming Fu, Yan Lin, Xu Zhang. 575-593 [doi]
- DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android MalwareZhiqiang Li, Lichao Sun, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen. 597-616 [doi]
- GreatEatlon: Fast, Static Detection of Mobile RansomwareChengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi. 617-636 [doi]
- Data Flow Analysis on Android Platform with Fragment Lifecycle ModelingYongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao. 637-654 [doi]
- Alde: Privacy Risk Analysis of Analytics Libraries in the Android EcosystemXing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu. 655-672 [doi]
- FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFsQinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang. 675-693 [doi]
- Extracting More Entropy for TRNGs Based on Coherent SamplingJing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing. 694-709 [doi]
- A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite FieldHailiang Fu, Guoqiang Bai, Xingjun Wu. 710-721 [doi]
- Security Analysis of Vendor Customized Code in Firmware of Embedded DeviceMuqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu. 722-739 [doi]
- POSTER: Security Analysis of Personal Unmanned Aerial VehiclesPeng Chen, Hao Chen. 743-746 [doi]
- Modeling User Browsing Activity for Application Layer DDoS Attack DetectionTungNgai Miu, Chenxu Wang, Daniel Xiapu Luo, Jinhe Wang. 747-750 [doi]
- POSTER: A Framework for IoT ReprogrammingNian Xue, Lulu Liang, Jie Zhang, Xin Huang. 751-754 [doi]
- Privacy Preserving Data Classification Using Inner Product EncryptionDamien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey. 755-757 [doi]
- POSTER: Location Privacy Using Homomorphic EncryptionPeizhao Hu, Siyu Zhu. 758-761 [doi]
- SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking SystemKailei Ren, Qiang Wei, Zehui Wu, QingXian Wang. 762-765 [doi]
- POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel AttacksJuan Ai, Zhu Wang, Xinping Zhou, Changhai Ou. 766-769 [doi]
- Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly DetectionIvan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek. 770-773 [doi]
- POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality AnalysisFei Peng, Le Qin, Min Long. 774-777 [doi]