Abstract is missing.
- TL;DR Hazard: A Comprehensive Study of Levelsquatting ScamsKun Du, Hao Yang, Zhou Li 0001, Hai-Xin Duan, Shuang Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang. 3-25 [doi]
- Account Lockouts: Characterizing and Preventing Account Denial-of-Service AttacksYu Liu, Matthew R. Squires, Curtis R. Taylor, Robert J. Walls, Craig A. Shue. 26-46 [doi]
- Application Transiency: Towards a Fair Trade of Personal Information for Application ServicesRaquel Alvarez, Jake Levenson, Ryan Sheatsley, Patrick D. McDaniel. 47-66 [doi]
- CustomPro: Network Protocol Customization Through Cross-Host Feature AnalysisYurong Chen, Tian Lan, Guru Venkataramani. 67-85 [doi]
- On the Security of TRNGs Based on Multiple Ring OscillatorsXinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin. 89-107 [doi]
- Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted RelayKeke Hu, Xiaohui Zhang, Yongming Wang. 108-125 [doi]
- Target Information Trading - An Economic Perspective of SecurityJing Hou, Li Sun, Tao Shu, Husheng Li. 126-145 [doi]
- Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery SystemSharif Ullah, Sachin Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan. 146-160 [doi]
- The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular PlatooningAli Al-Hashimi, Pratham Oza, Ryan M. Gerdes, Thidapat Chantem. 163-183 [doi]
- Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-PolicyShengmin Xu, Yinghui Zhang 0002, Yingjiu Li, Ximeng Liu, Guomin Yang. 184-204 [doi]
- Online Cyber Deception System Using Partially Observable Monte-Carlo Planning FrameworkMd Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua. 205-223 [doi]
- SEVGuard: Protecting User Mode Applications Using Secure Encrypted VirtualizationRalph Palutke, Andreas Neubaum, Johannes Götzfried. 224-242 [doi]
- A Behavior-Aware Profiling of Smart ContractsXuetao Wei, Can Lu, Fatma Rana Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang. 245-258 [doi]
- A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris TraitFeng Zhu, Peisong Shen, Chi Chen. 259-272 [doi]
- Detecting Root-Level Endpoint Sensor Compromises with Correlated ActivityYunsen Lei, Craig A. Shue. 273-286 [doi]
- Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFVMontida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi. 287-301 [doi]
- Hecate: Automated Customization of Program and Communication Features to Reduce Attack SurfacesHongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan. 305-319 [doi]
- Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency LogsEdona Fasllija, Hasan Ferit Eniser, Bernd Prünster. 320-334 [doi]
- IIFA: Modular Inter-app Intent Information Flow Analysis of Android ApplicationsAbhishek Tiwari, Sascha Groß, Christian Hammer 0001. 335-349 [doi]
- Power Analysis and Protection on SPECK and Its Application in IoTJing Ge, an Wang, Liehuang Zhu, Xin Liu, Ning Shang, Guoshuang Zhang. 350-362 [doi]
- Adversarial False Data Injection Attack Against Nonlinear AC State Estimation with ANN in Smart GridTian Liu, Tao Shu. 365-379 [doi]
- On Effectiveness of Adversarial Examples and Defenses for Malware ClassificationRobert Podschwadt, Hassan Takabi. 380-393 [doi]
- PrivC - A Framework for Efficient Secure Two-Party ComputationKai He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Zhuxun Liang. 394-407 [doi]
- CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog ComputingMeng Li 0006, Liehuang Zhu, Xiaodong Lin. 408-422 [doi]
- Non-Interactive MPC with Trusted Hardware Secure Against Residual Function AttacksRyan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung. 425-439 [doi]
- A Study of the Multiple Sign-in Feature in Web ApplicationsMarwan Albahar, Xing Gao 0001, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao. 440-453 [doi]
- Authenticated LSM Trees with Minimal TrustYuzhe Tang, Kai Li, Ju Chen. 454-471 [doi]
- Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGXAlexandros Bakas, Antonis Michalas. 472-486 [doi]
- A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control PoliciesMasoud Narouei, Hassan Takabi. 489-506 [doi]