Abstract is missing.
- Adapting Software Fault Isolation to Contemporary CPU ArchitecturesDavid Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen. 1-12 [doi]
- Making Linux Protection Mechanisms Egalitarian with UserFSTaesoo Kim, Nickolai Zeldovich. 13-28 [doi]
- Capsicum: Practical Capabilities for UNIXRobert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway. 29-46 [doi]
- Structuring Protocol Implementations to Protect Sensitive DataPetr Marchenko, Brad Karp. 47-62 [doi]
- PrETP: Privacy-Preserving Electronic Toll PricingJosep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens. 63-78 [doi]
- An Analysis of Private Browsing Modes in Modern BrowsersGaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh. 79-94 [doi]
- BotGrep: Finding P2P Bots with Structured Graph AnalysisShishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov. 95-110 [doi]
- Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention SystemsChad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, Alex X. Liu. 111-126 [doi]
- Searching the Searchers with SearchAuditJohn P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy. 127-142 [doi]
- Toward Automated Detection of Logic Vulnerabilities in Web ApplicationsViktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna. 143-160 [doi]
- Baaz: A System for Detecting Access Control MisconfigurationsTathagata Das, Ranjita Bhagwan, Prasad Naldurg. 161-176 [doi]
- Cling: A Memory Allocator to Mitigate Dangling PointersPeriklis Akritidis. 177-192 [doi]
- ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic CashSarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya. 193-206 [doi]
- P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious UsersYitao Duan, NetEase Youdao, John Canny, Justin Z. Zhan. 207-222 [doi]
- SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and StatisticsMartin Burkhart, Mario Strasser, Dilip Many, Xenofontas A. Dimitropoulos. 223-240 [doi]
- Dude, Where s That IP? Circumventing Measurement-based IP GeolocationPhillipa Gill, Yashar Ganjali, Bernard Wong, David Lie. 241-256 [doi]
- Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model CheckingRoya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall. 257-272 [doi]
- Building a Dynamic Reputation System for DNSManos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster. 273-290 [doi]
- Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot PrivacyRichard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora. 291-306 [doi]
- Acoustic Side-Channel Attacks on PrintersMichael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder. 307-322 [doi]
- Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case StudyIshtiaq Rouf, Rob Miller, Hossen A. Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar. 323-338 [doi]
- VEX: Vetting Browser Extensions for Security VulnerabilitiesSruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett. 339-354 [doi]
- Securing Script-Based Extensibility in Web BrowsersVladan Djeric, Ashvin Goel. 355-370 [doi]
- AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web AdvertisementsMike Ter Louw, Karthik Thotta Ganesh, V. N. Venkatakrishnan. 371-388 [doi]
- Realization of RF Distance BoundingKasper Bonne Rasmussen, Srdjan Capkun. 389-402 [doi]
- The Case for Ubiquitous Transport-Level EncryptionAndrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh. 403-418 [doi]
- Automatic Generation of Remediation Procedures for Malware InfectionsRoberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha. 419-434 [doi]
- Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic ContextMarti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. 435-462 [doi]
- Chipping Away at Censorship Firewalls with User-Generated ContentSam Burnett, Nick Feamster, Santosh Vempala. 463-468 [doi]
- Fighting Coercion Attacks in Key Generation using Skin ConductancePayas Gupta, Debin Gao. 469-484 [doi]