Abstract is missing.
- All Your IFCException Are Belong to UsCatalin Hritcu, Michael Greenberg, Ben Karel, Benjamin C. Pierce, Greg Morrisett. 3-17 [doi]
- Declarative, Temporal, and Practical Programming with CapabilitiesWilliam R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson, Robert N. M. Watson. 18-32 [doi]
- Towards Practical Reactive Security Audit Using Extended Static CheckersJulien Vanegue, Shuvendu K. Lahiri. 33-47 [doi]
- SoK: Eternal War in MemoryLaszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song. 48-62 [doi]
- The Parrot Is Dead: Observing Unobservable Network CommunicationsAmir Houmansadr, Chad Brubaker, Vitaly Shmatikov. 65-79 [doi]
- Trawling for Tor Hidden Services: Detection, Measurement, DeanonymizationAlex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann. 80-94 [doi]
- SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer BotnetsChristian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos. 97-111 [doi]
- Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web InfrastructuresZhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, Xiaofeng Wang. 112-126 [doi]
- The Crossfire AttackMin-Suk Kang, Soo Bum Lee, Virgil D. Gligor. 127-141 [doi]
- Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog SensorsDenis Foo Kune, John Backes, Shane S. Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu. 145-159 [doi]
- On Limitations of Friendly Jamming for ConfidentialityNils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun. 160-173 [doi]
- Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same TimeWenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai. 174-188 [doi]
- Practical Timing Side Channel Attacks against Kernel Space ASLRRalf Hund, Carsten Willems, Thorsten Holz. 191-205 [doi]
- PrivExec: Private Execution as an Operating System ServiceKaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda. 206-220 [doi]
- A Hybrid Architecture for Interactive Verifiable ComputationVictor Vu, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish. 223-237 [doi]
- Pinocchio: Nearly Practical Verifiable ComputationBryan Parno, Jon Howell, Craig Gentry, Mariana Raykova 0001. 238-252 [doi]
- ObliviStore: High Performance Oblivious Cloud StorageEmil Stefanov, Elaine Shi. 253-267 [doi]
- Hiding Information in Flash MemoryYinglei Wang, Wing-Kei S. Yu, Sarah Q. Xu, Edwin Kan, G. Edward Suh. 271-285 [doi]
- PUFs in Security Protocols: Attack Models and Security EvaluationsUlrich Rührmair, Marten van Dijk. 286-300 [doi]
- SoK: Secure Data DeletionJoel Reardon, David A. Basin, Srdjan Capkun. 301-315 [doi]
- Anon-Pass: Practical Anonymous SubscriptionsMichael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, Jonathan Katz. 319-333 [doi]
- Privacy-Preserving Ridge Regression on Hundreds of Millions of RecordsValeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft. 334-348 [doi]
- A Scanner Darkly: Protecting User Privacy from Perceptual ApplicationsSuman Jana, Arvind Narayanan, Vitaly Shmatikov. 349-363 [doi]
- Caveat Coercitor: Coercion-Evidence in Electronic VotingGurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan. 367-381 [doi]
- SoK: The Evolution of Sybil Defense via Social NetworksLorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi. 382-396 [doi]
- Zerocoin: Anonymous Distributed E-Cash from BitcoinIan Miers, Christina Garman, Matthew Green 0001, Aviel D. Rubin. 397-411 [doi]
- seL4: From General Purpose to a Proof of Information Flow EnforcementToby C. Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, Gerwin Klein. 415-429 [doi]
- Design, Implementation and Verification of an eXtensible and Modular Hypervisor FrameworkAmit Vasudevan, Sagar Chaki, Limin Jia, Jonathan M. McCune, James Newsome, Anupam Datta. 430-444 [doi]
- Implementing TLS with Verified Cryptographic SecurityKarthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub. 445-459 [doi]
- An Ideal-Security Protocol for Order-Preserving EncodingRaluca A. Popa, Frank H. Li, Nickolai Zeldovich. 463-477 [doi]
- Efficient Garbling from a Fixed-Key BlockcipherMihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway. 478-492 [doi]
- Circuit Structures for Improving Efficiency of Security and Privacy ToolsSamee Zahur, David Evans. 493-507 [doi]
- SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model EnhancementsJeremy Clark, Paul C. van Oorschot. 511-525 [doi]
- Lucky Thirteen: Breaking the TLS and DTLS Record ProtocolsNadhem J. AlFardan, Kenneth G. Paterson. 526-540 [doi]
- Cookieless Monster: Exploring the Ecosystem of Web-Based Device FingerprintingNick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna. 541-555 [doi]
- Practical Control Flow Integrity and Randomization for Binary ExecutablesChao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou. 559-573 [doi]
- Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout RandomizationKevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi. 574-588 [doi]
- Welcome to the Entropics: Boot-Time Entropy in Embedded DevicesKeaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson. 589-603 [doi]