Abstract is missing.
- Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iksAndrew M. White 0002, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose. 3-18 [doi]
- The Failure of Noise-Based Non-continuous Audio CaptchasElie Bursztein, Romain Beauxis, Hristo Paskov, Daniele Perito, Celine Fabry, John C. Mitchell. 19-31 [doi]
- Using Fingerprint Authentication to Reduce System Security: An Empirical StudyHugh Wimberly, Lorie M. Liebrock. 32-46 [doi]
- Silencing Hardware BackdoorsAdam Waksman, Simha Sethumadhavan. 49-63 [doi]
- Defeating UCI: Building Stealthy and Malicious HardwareCynthia Sturton, Matthew Hicks, David Wagner, Samuel T. King. 64-77 [doi]
- Formalizing Anonymous Blacklisting SystemsRyan Henry, Ian Goldberg. 81-95 [doi]
- Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile DevicesMichael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf. 96-111 [doi]
- Verified Security for Browser ExtensionsArjun Guha, Matthew Fredrikson, Benjamin Livshits, Nikhil Swamy. 115-130 [doi]
- RePriv: Re-imagining Content Personalization and In-browser PrivacyMatthew Fredrikson, Benjamin Livshits. 131-146 [doi]
- I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel AttacksZachary Weinberg, Eric Yawei Chen, Pavithra Ramesh Jayaraman, Collin Jackson. 147-161 [doi]
- Verification of Information Flow and Access Control Policies with Dependent TypesAleksandar Nanevski, Anindya Banerjee, Deepak Garg. 165-179 [doi]
- Inference of Expressive Declassification PoliciesJeffrey A. Vaughan, Stephen Chong. 180-195 [doi]
- The Complexity of Intransitive NoninterferenceSebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke. 196-211 [doi]
- SCION: Scalability, Control, and Isolation on Next-Generation NetworksXin Zhang 0003, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen. 212-227 [doi]
- "You Might Also Like: " Privacy Risks of Collaborative FilteringJoseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov. 231-246 [doi]
- Quantifying Location PrivacyReza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux. 247-262 [doi]
- Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network SystemsPhilip W. L. Fong. 263-278 [doi]
- PRISM: Program Replication and Integration for Seamless MILSChris A. Owen, Duncan A. Grove, Tristan Newby, Alex Murray, Chris J. North, Michael Pope. 281-296 [doi]
- Virtuoso: Narrowing the Semantic Gap in Virtual Machine IntrospectionBrendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee. 297-312 [doi]
- HomeAlone: Co-residency Detection in the Cloud via Side-Channel AnalysisYinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter. 313-328 [doi]
- TxBox: Building Secure, Efficient Sandboxes with System TransactionsSuman Jana, Donald E. Porter, Vitaly Shmatikov. 329-344 [doi]
- Differential Slicing: Identifying Causal Execution Differences for Security ApplicationsNoah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song. 347-362 [doi]
- Automated Analysis of Security-Critical JavaScript APIsAnkur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir Nagra. 363-378 [doi]
- Memoir: Practical State Continuity for Protected ModulesBryan Parno, Jacob R. Lorch, John R. Douceur, James W. Mickens, Jonathan M. McCune. 379-394 [doi]
- A Formalization of the Security Features of Physical FunctionsFrederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann. 397-412 [doi]
- Timing- and Termination-Sensitive Secure Information Flow: Exploring a New ApproachVineeth Kashyap, Ben Wiedermann, Ben Hardekopf. 413-428 [doi]
- Click Trajectories: End-to-End Analysis of the Spam Value ChainKirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage. 431-446 [doi]
- Design and Evaluation of a Real-Time URL Spam Filtering ServiceKurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song. 447-462 [doi]
- How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web StoresRui Wang 0010, Shuo Chen, Xiaofeng Wang, Shaz Qadeer. 465-480 [doi]
- Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NETThai Duong, Juliano Rizzo. 481-489 [doi]
- Cache Games - Bringing Access-Based Cache Attacks on AES to PracticeDavid Gullasch, Endre Bangerter, Stephan Krenn. 490-505 [doi]
- OpenConflict: Preventing Real Time Map Hacks in Online GamesElie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh. 506-520 [doi]
- Extending Nymble-like SystemsRyan Henry, Ian Goldberg. 523-537 [doi]
- Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case StudyRalf Küsters, Tomasz Truderung, Andreas Vogt 0001. 538-553 [doi]