Abstract is missing.
- Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone SpaceNan Jiang, Yu Jin 0001, Ann Skudlark, Zhi-Li Zhang. 1-16 [doi]
- Practical Comprehensive Bounds on Surreptitious Communication over DNSVern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema, Nicholas Weaver. 17-32 [doi]
- Let Me Answer That for You: Exploiting Broadcast Information in Cellular NetworksNico Golde, Kevin Redon, Jean-Pierre Seifert. 33-48 [doi]
- Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary ViolationsIstván Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos. 49-64 [doi]
- MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic AnalysisRuowen Wang, Peng Ning, Tao Xie, Quan Chen. 65-80 [doi]
- Towards Automatic Software Lineage InferenceJiyong Jang, Maverick Woo, David Brumley. 81-96 [doi]
- Securing Embedded User Interfaces: Android and BeyondFranziska Roesner, Tadayoshi Kohno. 97-112 [doi]
- Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone ApplicationsBenjamin Livshits, Jaeyeon Jung. 113-130 [doi]
- Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy PoliciesSven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi. 131-146 [doi]
- Proactively Accountable Anonymous Messaging in VerdictHenry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford. 147-162 [doi]
- ZQL: A Compiler for Privacy-Preserving Data ProcessingCédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo. 163-178 [doi]
- DupLESS: Server-Aided Encryption for Deduplicated StorageSriram Keelveedhi, Mihir Bellare, Thomas Ristenpart. 179-194 [doi]
- Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and AbuseKurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson. 195-210 [doi]
- Impression Fraud in On-line Advertising via Pay-Per-View NetworksKevin Springborn, Paul Barford. 211-226 [doi]
- The Velocity of Censorship: High-Fidelity Detection of Microblog Post DeletionsTao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach. 227-240 [doi]
- You Are How You Click: Clickstream Analysis for Sybil DetectionGang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao. 241-256 [doi]
- Alice in Warningland: A Large-Scale Field Study of Browser Security Warning EffectivenessDevdatta Akhawe, Adrienne Porter Felt. 257-272 [doi]
- An Empirical Study of Vulnerability Rewards ProgramsMatthew Finifter, Devdatta Akhawe, David Wagner. 273-288 [doi]
- Secure Outsourced Garbled Circuit Evaluation for Mobile DevicesHenry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler. 289-304 [doi]
- On the Security of RC4 in TLSNadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt. 305-320 [doi]
- PCF: A Portable Circuit Format for Scalable Two-Party Secure ComputationBenjamin Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler. 321-336 [doi]
- Control Flow Integrity for COTS BinariesMingwei Zhang, R. Sekar. 337-352 [doi]
- Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow StructuringDavid Brumley, JongHyup Lee, Edward J. Schwartz, Maverick Woo. 353-368 [doi]
- Strato: A Retargetable Framework for Low-Level Inlined-Reference MonitorsBin Zeng 0004, Gang Tan, Úlfar Erlingsson. 369-382 [doi]
- On the Security of Picture Gesture AuthenticationZiming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu. 383-398 [doi]
- Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and AuthorizationRui Wang 0010, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich. 399-314 [doi]
- Enabling Fine-Grained Permissions for Augmented Reality Applications with RecognizersSuman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek. 415-430 [doi]
- CacheAudit: A Tool for the Static Analysis of Cache Side ChannelsGoran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke. 431-446 [doi]
- Transparent ROP Exploit Mitigation Using Indirect Branch TracingVasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis. 447-462 [doi]
- FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic ExecutionDrew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha. 463-478 [doi]
- Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing BaseJob Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens. 479-494 [doi]
- Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for ObfuscationFrank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunitara. 495-510 [doi]
- KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel ObjectHoJoon Lee, Hyungon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang. 511-526 [doi]
- WHYPER: Towards Automating Risk Assessment of Mobile ApplicationsRahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie. 527-542 [doi]
- Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security AnalysisDamien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon. 543-558 [doi]
- Jekyll on iOS: When Benign Apps Become EvilTielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee. 559-572 [doi]
- Measuring the Practical Impact of DNSSEC DeploymentWilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage. 573-588 [doi]
- ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol TemplatesTerry Nelms, Roberto Perdisci, Mustaque Ahamad. 589-604 [doi]
- ZMap: Fast Internet-wide Scanning and Its Security ApplicationsZakir Durumeric, Eric Wustrow, J. Alex Halderman. 605-620 [doi]
- Eradicating DNS Rebinding with the Extended Same-origin PolicyMartin Johns, Sebastian Lekies, Ben Stock. 621-636 [doi]
- Revolver: An Automated Approach to the Detection of Evasive Web-based MalwareAlexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna. 637-652 [doi]
- Language-based Defenses Against Untrusted Browser OriginsKarthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis. 653-670 [doi]
- Take This Personally: Pollution Attacks on Personalized ServicesXinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee. 671-686 [doi]
- Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media ServicesRuoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. 687-702 [doi]
- Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle ImmobilizerRoel Verdult, Flavio D. Garcia, Baris Ege. 703-718 [doi]