Abstract is missing.
- Verifying Trustworthiness of Virtual Appliances in Collaborative EnvironmentsCornelius Namiluko, Jun Ho Huh, Andrew Martin. 1-15 [doi]
- Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded SystemsKurt Dietrich, Johannes Winter. 16-32 [doi]
- Side-Channel Analysis of PUFs and Fuzzy ExtractorsDominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl. 33-47 [doi]
- Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUFLukasz Krzywiecki, Miroslaw Kutylowski. 48-62 [doi]
- A Practical Device Authentication Scheme Using SRAM PUFsPatrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Wei Wu. 63-77 [doi]
- Practical Property-Based Attestation on Mobile DevicesKari Kostiainen, N. Asokan, Jan-Erik Ekberg. 78-92 [doi]
- Taming Information-Stealing Smartphone Applications (on Android)Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh. 93-107 [doi]
- Towards Permission-Based Attestation for the Android Platform - (Short Paper)Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden, Johannes Westhuis. 108-115 [doi]
- Trusting to Learn: Trust and Privacy Issues in Serious GamesMiguel Malheiros, Charlene Jennett, Will Seager, Martina Angela Sasse. 116-130 [doi]
- Modifying Trust Dynamics through Cooperation and Defection in Evolving Social NetworksLuca Allodi, Luca Chiodi, Marco Cremonini. 131-145 [doi]
- Who Is Concerned about What? A Study of American, Chinese and Indian Users Privacy Concerns on Social Network Sites - (Short Paper)Yang Wang, Gregory Norice, Lorrie Faith Cranor. 146-153 [doi]
- Systematic Security Assessment at an Early Processor Design StageRuirui C. Huang, David Grawrock, David C. Doughty, G. Edward Suh. 154-171 [doi]
- CPU Support for Secure ExecutablesPeter Williams, Rick Boivie. 172-187 [doi]
- Extracting Device Fingerprints from Flash Memory by Exploiting Physical VariationsPravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan, Steven Swanson. 188-201 [doi]
- Enforcing Executing-Implies-Verified with the Integrity-Aware ProcessorMichael LeMay, Carl A. Gunter. 202-216 [doi]
- Home-Network Threats and Access ControlsMark Baugher, Victor Lortz. 217-230 [doi]
- Contego: Capability-Based Access Control for Web Browsers - (Short Paper)Tongbo Luo, Wenliang Du. 231-238 [doi]
- Efficient Techniques for Privacy-Preserving Sharing of Sensitive InformationEmiliano De Cristofaro, Yanbin Lu, Gene Tsudik. 239-253 [doi]
- CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper)Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan. 254-261 [doi]
- AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGPJian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, Insup Lee. 262-276 [doi]
- Incentivizing Responsible Networking via Introduction-Based RoutingGregory Frazier, Quang Duong, Michael P. Wellman, Edward Petersen. 277-293 [doi]
- Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell, David C. Challener. 294-301 [doi]
- Group Distance Bounding Protocols - (Short Paper)Srdjan Capkun, Karim M. El Defrawy, Gene Tsudik. 302-312 [doi]