Abstract is missing.
- Gray-Box Software Integrity Checking via Side-ChannelsHong Liu, Eugene Y. Vasserman. 3-23 [doi]
- Enhancing Android Security Through App SplittingDrew Davidson, Vaibhav Rastogi, Mihai Christodorescu, Somesh Jha. 24-44 [doi]
- Very Short Intermittent DDoS Attacks in an Unsaturated SystemHuasong Shan, Qingyang Wang, Qiben Yan. 45-66 [doi]
- Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark FrameworkHong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming-xian. 67-87 [doi]
- Guilt-by-Association: Detecting Malicious Entities via Graph MiningPejman Najafi, Andrey Sapegin, Feng Cheng 0002, Christoph Meinel. 88-107 [doi]
- Twisting Lattice and Graph Techniques to Compress Transactional LedgersRémi Géraud, David Naccache, Razvan Rosie. 108-127 [doi]
- Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable EncryptionPeisong Shen, Chi Chen, Xiaojie Zhu. 128-146 [doi]
- Exploring the Network of Real-World Passwords: Visualization and EstimationXiujia Guo, Zhao Wang, Zhong Chen. 147-166 [doi]
- ThiefTrap - An Anti-theft Framework for AndroidSascha Groß, Abhishek Tiwari, Christian Hammer. 167-184 [doi]
- BluePass: A Secure Hand-Free Password ManagerYue Li 0002, Haining Wang, Kun Sun. 185-205 [doi]
- Lambda ObfuscationPengwei Lan, Pei Wang, Shuai Wang, Dinghao Wu. 206-224 [doi]
- Turing ObfuscationYan Wang, Shuai Wang, Pei Wang, Dinghao Wu. 225-244 [doi]
- All Your Accounts Are Belong to UsVlad Bulakh, Andrew J. Kaizer, Minaxi Gupta. 245-269 [doi]
- SDN-Based Kernel Modular Countermeasure for Intrusion DetectionTommy Chin, Kaiqi Xiong, Mohamed Rahouti. 270-290 [doi]
- LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage DetectionYi He, Qi Li, Kun Sun. 291-311 [doi]
- Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio InteractionsMuhammad Taqi Raza, Fatima Muhammad Anwar, Songwu Lu. 312-338 [doi]
- Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social ApplicationsFengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li 0006. 339-355 [doi]
- Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow AttackJiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang 0001, Jing Zheng. 356-376 [doi]
- VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected VehiclesPinyao Guo, Hunmin Kim, Le Guan, Minghui Zhu, Peng Liu. 377-396 [doi]
- Understanding Adversarial Strategies from Bot Recruitment to SchedulingWentao Chang, Aziz Mohaisen, an Wang, Songqing Chen. 397-417 [doi]
- Mending Wall: On the Implementation of Censorship in IndiaDevashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty. 418-437 [doi]
- A Deep Learning Based Online Malicious URL and DNS Detection SchemeJianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang. 438-448 [doi]
- Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call GraphYan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song. 449-468 [doi]
- Inferring Implicit Assumptions and Correct Usage of Mobile Payment ProtocolsQuanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong. 469-488 [doi]
- HSTS Measurement and an Enhanced Stripping Attack Against HTTPSXurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah. 489-509 [doi]
- Defining and Detecting Environment Discrimination in Android AppsYunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul Yu, Hasan Cam, Gail-Joon Ahn. 510-529 [doi]
- Query Recovery Attacks on Searchable Encryption Based on Partial KnowledgeGuofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang. 530-549 [doi]
- H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 ProtocolXiang Ling, Chunming Wu, Shouling Ji, Meng Han. 550-570 [doi]
- Optimizing TLB for Access Pattern Privacy Protection in Data OutsourcingYao Liu, Qingkai Zeng, Pinghai Yuan. 571-584 [doi]
- An Efficient Trustzone-Based In-application Isolation Schema for Mobile AuthenticatorsYingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang. 585-605 [doi]
- A Program Manipulation Middleware and Its Applications on System SecurityTing Chen, Yang Xu, Xiaosong Zhang. 606-626 [doi]
- Cross-site Input Inference Attacks on Mobile Web UsersRui Zhao 0005, Chuan Yue, Qi Han. 629-643 [doi]
- BKI: Towards Accountable and Decentralized Public-Key Infrastructure with BlockchainZhiguo Wan, Zhangshuang Guan, Feng Zhuo, Hequn Xian. 644-658 [doi]
- FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer ProtectionJianming Fu, Rui Jin, Yan Lin. 659-672 [doi]
- VaultIME: Regaining User Control for Password Managers Through Auto-CorrectionLe Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu. 673-686 [doi]
- TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined NetworksSubramaniyam Kannan, Paul Wood, Larry Deatrick, Patricia Beane, Somali Chaterji, Saurabh Bagchi. 687-703 [doi]
- JSForce: A Forced Execution Engine for Malicious JavaScript DetectionXunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin. 704-720 [doi]
- ROPOB: Obfuscating Binary Code via Return Oriented ProgrammingDongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi. 721-737 [doi]
- DiffGuard: Obscuring Sensitive Information in Canary Based ProtectionsJun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao. 738-751 [doi]
- A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech CodingZhongliang Yang, Xueshun Peng, Yongfeng Huang. 752-762 [doi]
- A Framework for Formal Analysis of Privacy on SSO ProtocolsKailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong. 763-777 [doi]
- A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel MalwareChonghua Wang, ShiQing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao. 778-792 [doi]
- An On-Demand Defense Scheme Against DNS Cache Poisoning AttacksZheng Wang, Shui Yu, Scott Rose. 793-807 [doi]
- MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data PrivacyJinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li. 808-822 [doi]
- SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure RelianceJian Kang, Yousef Elmehdwi, Dan Lin 0001. 823-837 [doi]
- A-Tor: Accountable Anonymity in TorQuanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo. 838-851 [doi]