Abstract is missing.
- A Framework to Eliminate Backdoors from Response-Computable AuthenticationShuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou. 3-17 [doi]
- Safe Loading - A Foundation for Secure Execution of Untrusted ProgramsMathias Payer, Tobias Hartmann, Thomas R. Gross. 18-32 [doi]
- Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device FingerprintsYinglei Wang, Wing-Kei S. Yu, Shuo Wu, Greg Malysa, G. Edward Suh, Edwin Kan. 33-47 [doi]
- ReDeBug: Finding Unpatched Code Clones in Entire OS DistributionsJiyong Jang, Abeer Agrawal, David Brumley. 48-62 [doi]
- Prudent Practices for Designing Malware Experiments: Status Quo and OutlookChristian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen. 65-79 [doi]
- Abusing File Processing in Malware Detectors for Fun and ProfitSuman Jana, Vitaly Shmatikov. 80-94 [doi]
- Dissecting Android Malware: Characterization and EvolutionYajin Zhou, Xuxian Jiang. 95-109 [doi]
- Distance Hijacking Attacks on Distance Bounding ProtocolsCas J. F. Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun. 113-127 [doi]
- Don't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz. 128-142 [doi]
- Memento: Learning Secrets from Process FootprintsSuman Jana, Vitaly Shmatikov. 143-157 [doi]
- Foundations of Logic-Based Trust ManagementMoritz Y. Becker, Alessandra Russo, Nik Sultana. 161-175 [doi]
- Formalizing and Enforcing Purpose Restrictions in Privacy PoliciesMichael Carl Tschantz, Anupam Datta, Jeannette M. Wing. 176-190 [doi]
- Sharing Mobile Code Securely with Information Flow ControlOwen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, Andrew C. Myers. 191-205 [doi]
- The Psychology of Security for the Home Computer UserAdele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta Byrne. 209-223 [doi]
- User-Driven Access Control: Rethinking Permission Granting in Modern Operating SystemsFranziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan. 224-238 [doi]
- New Results for Timing-Based AttestationXeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, John Butterworth. 239-253 [doi]
- ObliviAd: Provably Secure and Practical Online Behavioral AdvertisingMichael Backes, Aniket Kate, Matteo Maffei, Kim Pecina. 257-271 [doi]
- Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual ExecutionYan Huang, Jonathan Katz, David Evans. 272-284 [doi]
- Hummingbird: Privacy at the Time of TwitterEmiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams. 285-299 [doi]
- On the Feasibility of Internet-Scale Author IdentificationArvind Narayanan, Hristo Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song. 300-314 [doi]
- Secure and Scalable Fault Localization under Dynamic Traffic PatternsXin Zhang 0003, Chang Lan, Adrian Perrig. 317-331 [doi]
- Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures FailKevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton. 332-346 [doi]
- Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce SecurityZhiyun Qian, Zhuoqing Morley Mao. 347-361 [doi]
- Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web ServicesRui Wang 0010, Shuo Chen, Xiaofeng Wang. 365-379 [doi]
- Unleashing Mayhem on Binary CodeSang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley. 380-394 [doi]
- Clash Attacks on the Verifiability of E-Voting SystemsRalf Küsters, Tomasz Truderung, Andreas Vogt 0001. 395-409 [doi]
- Third-Party Web Tracking: Policy and TechnologyJonathan R. Mayer, John C. Mitchell. 413-427 [doi]
- EvilSeed: A Guided Approach to Finding Malicious Web PagesLuca Invernizzi, Paolo Milani Comparetti. 428-442 [doi]
- Rozzle: De-cloaking Internet MalwareClemens Kolbitsch, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert. 443-457 [doi]
- Detecting Hoaxes, Frauds, and Deception in Writing Style OnlineSadia Afroz, Michael Brennan, Rachel Greenstadt. 461-475 [doi]
- LASTor: A Low-Latency AS-Aware Tor ClientMasoud Akhoondi, Curtis Yu, Harsha V. Madhyastha. 476-490 [doi]
- OB-PWS: Obfuscation-Based Private Web SearchEro Balsa, Carmela Troncoso, Claudia Díaz. 491-505 [doi]
- LAP: Lightweight Anonymity and PrivacyHsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng. 506-520 [doi]
- Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking AlgorithmsPatrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio Lopez. 523-537 [doi]
- The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million PasswordsJoseph Bonneau. 538-552 [doi]
- The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication SchemesJoseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano. 553-567 [doi]
- ILR: Where'd My Gadgets Go?Jason Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jack W. Davidson. 571-585 [doi]
- Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data RedirectionYangchun Fu, Zhiqiang Lin. 586-600 [doi]
- Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code RandomizationVasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis. 601-615 [doi]
- Building Verifiable Trusted Path on Commodity x86 ComputersZongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune. 616-630 [doi]