A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory |
Maximilian Seitzer, Michael Gruhn and Tilo Müller |
A Practical Approach for Adaptive Data Structure Layout Randomization |
Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu |
A Symmetric-Key Based Proofs of Retrievability Supporting Public Verification |
Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum and Jia Yu |
A Theory of Gray Security Policies |
Donald Ray and Jay Ligatti |
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud |
Jianting Ning, Zhenfu Cao, Xiaolei Dong and Lifei Wei |
Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments |
Sufatrio, Tong-Wei Chua, Darell J. J. Tan and Vrizlynn L. L. Thing |
All Your Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines |
Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena |
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web |
Daniel Fett, Ralf Kuesters and Guido Schmitz |
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key |
Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo |
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure |
Tobias Pulls and Roel Peeters |
Batch Verifiable Computation of Polynomials on Outsourced Data |
Liang Feng Zhang and Reihaneh Safavi-Naini |
Challenging the Trustworthyness of PGP: Is the Web-of-Trust Tear-proof? |
Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi and Stefano Sanfilippo |
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution |
Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey Foster and Michael Clarkson |
Checking trace equivalence: How to get rid of nonces? |
Rémy Chrétien, Veronique Cortier and Stephanie Delaune |
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud |
Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du and Zhibo Wang |
Computational Soundness for Interactive Primitives |
Michael Backes, Esfandiar Mohammadi and Tim Ruffing |
Confidence analysis for nuclear arms control: SMT abstractions of Bayesian Belief Networks |
Paul Beaumont, Neil Evans, Michael Huth and Tom Plant |
DexHunter: Toward Extracting Hidden Code from Packed Android Applications |
Yueqian Zhang, Xiapu Luo and Haoyang Yin |
DNS-Scopy: Towards Security of Internet Naming Infrastructure |
Haya Shulman and Michael Waidner |
DTLS-HIMMO: Achieving DTLS certificate security with symmetric key overhead |
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose-Luis Torre-Arce |
Efficient Message Authentication Codes with Combinatorial Group Testing |
Kazuhiko Minematsu |
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings |
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak |
Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records |
Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang |
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks |
Raja Naeem Akram and Konstantinos Markantonakis |
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption |
Yanjiang Yang, Joseph Liu, Alexander Liang, Raymond Choo and Jianying Zhou |
Factorization of Behavioral Integrity |
Ximeng Li, Flemming Nielson and Hanne Riis Nielson |
FP-Block: usable web privacy by controlling browser fingerprinting |
Christof Torres, Hugo Jonker and Sjouke Mauw |
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software |
Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena |
Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions |
Gildas Avoine, Xavier Carpent and Cédric Lauradoux |
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users |
Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Chris Gates and Ninghui Li |
Leveraging Real-Life Facts to Make Random Passwords More Memorable |
Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright and Shannon Scielzo |
Lightweight and Flexible Trust Assessment Modules for the Internet of Things |
Jan Tobias Muehlberg, Job Noorman and Frank Piessens |
Making any Identity Based Encryption Accountable, Efficiently |
Aggelos Kiayias and Qiang Tang |
Making Bitcoin Exchanges Transparent |
Christian Decker, James Guthrie, Jochen Seidel and Roger Wattenhofer |
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections |
Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang and Zhou Li |
Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification |
Marina Blanton and Siddharth Saraph |
On Security of Content-based Video Stream Authentication |
Swee-Won Lo, Zhuo Wei, Robert Deng and Xuhua Ding |
On the Fly Design and Co-simulation of Responses against Simultaneous Attacks |
Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun and Samuel Dubus |
Practical Memory Deduplication Attacks in Sandboxed Javascript |
Daniel Gruss, David Bidner and Stefan Mangard |
Practical Threshold Password-Authenticated Secret Sharing Protocol |
Xun Yi, Feng Hao, Liqun Chen and Joseph Liu |
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions |
Qiang Tang and Jun Wang |
Privacy-Preserving Link Prediction in Decentralized Online Social Networks |
Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou |
Privacy-Preserving Observation in Public Spaces |
Florian Kerschbaum and Hoon Wei Lim |
Rich Queries on Encrypted Data: Beyond Exact Matches |
Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel C. Rosu and Michael Steiner |
Server-Aided Revocable Identity-Based Encryption |
Baodong Qin, Robert Deng, Yingjiu Li and Shengli Liu |
Short Accountable Ring Signatures Based on DDH |
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth and Christophe Petit |
Should Cyber-Insurance Providers Invest in Software Security? |
Aron Laszka and Jens Grossklags |
Small Subgroup Attacks on TLS-ECDH |
Tibor Jager, Jörg Schwenk and Juraj Somorovsky |
Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards |
Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Rong Fu and Xinjun Xie |
The Emperor’s New Password Creation Policies |
Ding Wang and Ping Wang |
Towards Attack-Resistant Peer-Assisted Indoor Localization |
Jingyu Hua, Shaoyong Du and Sheng Zhong |
Transforming Out Timing Leaks, More or Less |
Heiko Mantel and Artem Starostin |
Trustworthy prevention of code injection in Linux on embedded devices |
Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam and Patrik Ekdahl |
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment |
Omar Almousa, Sebastian A. Mödersheim, Paolo Modesti and Luca Viganò |
Updatable Hash Proof System and Its Applications |
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu and Zuoxia Yu |
vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge |
Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang and Luning Xia |
Verifiably Encrypted Signatures: Security Revisited and a New Construction |
Christian Hanser, Max Rabkin and Dominique Schröder |
Waiting for CSP — Securing Legacy Web Applications with JSAgents |
Joerg Schwenk, Mario Heiderich and Marcus Niemietz |
Web-to-Application Injection Attacks on Android: Characterization and Detection |
Behnaz Hassanshahi, Yaoqi Jia, Roland Yap, Prateek Saxena and Zhenkai Liang |