Abstract is missing.
- PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsDamon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko. 1-16 [doi]
- B@bel: Leveraging Email Delivery for Spam MitigationGianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna. 16-32 [doi]
- Impact of Spam Exposure on User EngagementAnirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang. 33-48 [doi]
- Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in MotionYi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot. 49-64 [doi]
- How Does Your Password Measure Up? The Effect of Strength Meters on Password CreationBlase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. 65-80 [doi]
- I Forgot Your Password: Randomness Attacks Against PHP ApplicationsGeorge Argyros, Aggelos Kiayias. 81-96 [doi]
- An Evaluation of the Google Chrome Extension Security ArchitectureNicholas Carlini, Adrienne Porter Felt, David Wagner. 97-111 [doi]
- Establishing Browser Security Guarantees through Formal Shim VerificationDongseok Jang, Zachary Tatlock, Sorin Lerner. 113-128 [doi]
- Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose AttacksHristo Bojinov, Daniel Sanchez, Paul J. Reber, Dan Boneh, Patrick Lincoln. 129-141 [doi]
- On the Feasibility of Side-Channel Attacks with Brain-Computer InterfacesIvan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song. 143-158 [doi]
- Whispers in the Hyper-space: High-speed Covert Channel Attacks in the CloudZhenyu Wu, Zhang Xu, Haining Wang. 159-173 [doi]
- Policy-Sealed Data: A New Abstraction for Building Trusted Cloud ServicesNuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu. 175-188 [doi]
- STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the CloudTaesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz. 189-204 [doi]
- Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network DevicesNadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman. 205-220 [doi]
- TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without ClocksAmir Rahmati, Mastooreh Salajegheh, Daniel E. Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu. 221-236 [doi]
- Gone in 360 Seconds: Hijacking with Hitag2Roel Verdult, Flavio D. Garcia, Josep Balasch. 237-252 [doi]
- Taking Proof-Based Verified Computation a Few Steps Closer to PracticalitySrinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish. 253-268 [doi]
- Optimally Robust Private Information RetrievalCasey Devet, Ian Goldberg, Nadia Heninger. 269-283 [doi]
- Billion-Gate Secure Computation with Malicious AdversariesBenjamin Kreuter, Abhi Shelat, Chih-Hao Shen. 285-300 [doi]
- Progressive Authentication: Deciding When to Authenticate on Mobile PhonesOriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos. 301-316 [doi]
- Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the WebMichael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach. 317-331 [doi]
- Data Node Encrypted File System: Efficient Secure Deletion for Flash MemoryJoel Reardon, Srdjan Capkun, David A. Basin. 333-348 [doi]
- Throttling Tor Bandwidth ParasitesRob Jansen, Paul F. Syverson, Nicholas Hopper. 349-363 [doi]
- Chimera: A Declarative Language for Streaming Network Traffic AnalysisKevin Borders, Jonathan Springer, Matthew Burnside. 365-379 [doi]
- New Attacks on Timing-based Network Flow WatermarksZi Lin, Nicholas Hopper. 381-396 [doi]
- On Breaking SAML: Be Whoever You Want to BeJuraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen. 397-412 [doi]
- Clickjacking: Attacks and DefensesLin-Shung Huang, Alexander Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson. 413-428 [doi]
- Privilege Separation in HTML5 ApplicationsDevdatta Akhawe, Prateek Saxena, Dawn Song. 429-444 [doi]
- Fuzzing with Code FragmentsChristian Holler, Kim Herzig, Andreas Zeller. 445-458 [doi]
- kGuard: Lightweight Kernel Protection against Return-to-User AttacksVasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis. 459-474 [doi]
- Enhanced Operating System Security Through Efficient and Fine-grained Address Space RandomizationCristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum. 475-490 [doi]
- From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based MalwareManos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou II, Saeed Abu-Nimeh, Wenke Lee, David Dagon. 491-506 [doi]
- PUBCRAWL: Protecting Users and Businesses from CRAWLersGrégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna. 507-522 [doi]
- Enemy of the State: A State-Aware Black-Box Web Vulnerability ScannerAdam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna. 523-538 [doi]
- Aurasium: Practical Policy Enforcement for Android ApplicationsRubin Xu, Hassen Saïdi, Ross Anderson. 539-552 [doi]
- AdSplit: Separating Smartphone Advertising from ApplicationsShashi Shekhar, Michael Dietz, Dan S. Wallach. 553-567 [doi]
- DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware AnalysisLok-Kwong Yan, Heng Yin. 569-584 [doi]
- STING: Finding Name Resolution Vulnerabilities in ProgramsHayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger. 585-599 [doi]
- Tracking Rootkit Footprints with a Practical Memory Analysis SystemWeidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan. 601-615 [doi]
- Tachyon: Tandem Execution for Efficient Live Patch TestingMatthew Maurer, David Brumley. 617-630 [doi]
- Privacy-Preserving Social PluginsGeorgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos. 631-646 [doi]
- Social Networking with Frientegrity: Privacy and Integrity with an Untrusted ProviderAriel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten. 647-662 [doi]
- Efficient and Scalable Socware Detection in Online Social NetworksMd Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos. 663-678 [doi]