| A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory |
| Maximilian Seitzer, Michael Gruhn and Tilo Müller |
| A Practical Approach for Adaptive Data Structure Layout Randomization |
| Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu |
| A Symmetric-Key Based Proofs of Retrievability Supporting Public Verification |
| Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum and Jia Yu |
| A Theory of Gray Security Policies |
| Donald Ray and Jay Ligatti |
| Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud |
| Jianting Ning, Zhenfu Cao, Xiaolei Dong and Lifei Wei |
| Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments |
| Sufatrio, Tong-Wei Chua, Darell J. J. Tan and Vrizlynn L. L. Thing |
| All Your Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines |
| Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena |
| Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web |
| Daniel Fett, Ralf Kuesters and Guido Schmitz |
| Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key |
| Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo |
| Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure |
| Tobias Pulls and Roel Peeters |
| Batch Verifiable Computation of Polynomials on Outsourced Data |
| Liang Feng Zhang and Reihaneh Safavi-Naini |
| Challenging the Trustworthyness of PGP: Is the Web-of-Trust Tear-proof? |
| Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi and Stefano Sanfilippo |
| Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution |
| Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey Foster and Michael Clarkson |
| Checking trace equivalence: How to get rid of nonces? |
| Rémy Chrétien, Veronique Cortier and Stephanie Delaune |
| CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud |
| Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du and Zhibo Wang |
| Computational Soundness for Interactive Primitives |
| Michael Backes, Esfandiar Mohammadi and Tim Ruffing | Confidence analysis for nuclear arms control: SMT abstractions of Bayesian Belief Networks |
| Paul Beaumont, Neil Evans, Michael Huth and Tom Plant |
| DexHunter: Toward Extracting Hidden Code from Packed Android Applications |
| Yueqian Zhang, Xiapu Luo and Haoyang Yin |
| DNS-Scopy: Towards Security of Internet Naming Infrastructure |
| Haya Shulman and Michael Waidner |
| DTLS-HIMMO: Achieving DTLS certificate security with symmetric key overhead |
| Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose-Luis Torre-Arce |
| Efficient Message Authentication Codes with Combinatorial Group Testing |
| Kazuhiko Minematsu |
| Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings |
| Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak |
| Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records |
| Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang |
| Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks |
| Raja Naeem Akram and Konstantinos Markantonakis |
| Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption |
| Yanjiang Yang, Joseph Liu, Alexander Liang, Raymond Choo and Jianying Zhou |
| Factorization of Behavioral Integrity |
| Ximeng Li, Flemming Nielson and Hanne Riis Nielson |
| FP-Block: usable web privacy by controlling browser fingerprinting |
| Christof Torres, Hugo Jonker and Sjouke Mauw |
| Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software |
| Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena |
| Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions |
| Gildas Avoine, Xavier Carpent and Cédric Lauradoux |
| Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users |
| Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Chris Gates and Ninghui Li |
| Leveraging Real-Life Facts to Make Random Passwords More Memorable |
| Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright and Shannon Scielzo |
| Lightweight and Flexible Trust Assessment Modules for the Internet of Things |
| Jan Tobias Muehlberg, Job Noorman and Frank Piessens |
| Making any Identity Based Encryption Accountable, Efficiently |
| Aggelos Kiayias and Qiang Tang |
| Making Bitcoin Exchanges Transparent |
| Christian Decker, James Guthrie, Jochen Seidel and Roger Wattenhofer |
| Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections |
| Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang and Zhou Li |
| Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification |
| Marina Blanton and Siddharth Saraph |
| On Security of Content-based Video Stream Authentication |
| Swee-Won Lo, Zhuo Wei, Robert Deng and Xuhua Ding |
| On the Fly Design and Co-simulation of Responses against Simultaneous Attacks |
| Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun and Samuel Dubus |
| Practical Memory Deduplication Attacks in Sandboxed Javascript |
| Daniel Gruss, David Bidner and Stefan Mangard |
| Practical Threshold Password-Authenticated Secret Sharing Protocol |
| Xun Yi, Feng Hao, Liqun Chen and Joseph Liu |
| Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions |
| Qiang Tang and Jun Wang |
| Privacy-Preserving Link Prediction in Decentralized Online Social Networks |
| Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou |
| Privacy-Preserving Observation in Public Spaces |
| Florian Kerschbaum and Hoon Wei Lim |
| Rich Queries on Encrypted Data: Beyond Exact Matches |
| Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel C. Rosu and Michael Steiner |
| Server-Aided Revocable Identity-Based Encryption |
| Baodong Qin, Robert Deng, Yingjiu Li and Shengli Liu |
| Short Accountable Ring Signatures Based on DDH |
| Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth and Christophe Petit |
| Should Cyber-Insurance Providers Invest in Software Security? |
| Aron Laszka and Jens Grossklags |
| Small Subgroup Attacks on TLS-ECDH |
| Tibor Jager, Jörg Schwenk and Juraj Somorovsky |
| Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards |
| Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Rong Fu and Xinjun Xie |
| The Emperor’s New Password Creation Policies |
| Ding Wang and Ping Wang |
| Towards Attack-Resistant Peer-Assisted Indoor Localization |
| Jingyu Hua, Shaoyong Du and Sheng Zhong |
| Transforming Out Timing Leaks, More or Less |
| Heiko Mantel and Artem Starostin |
| Trustworthy prevention of code injection in Linux on embedded devices |
| Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam and Patrik Ekdahl |
| Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment |
| Omar Almousa, Sebastian A. Mödersheim, Paolo Modesti and Luca Viganò |
| Updatable Hash Proof System and Its Applications |
| Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu and Zuoxia Yu |
| vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge |
| Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang and Luning Xia |
| Verifiably Encrypted Signatures: Security Revisited and a New Construction |
| Christian Hanser, Max Rabkin and Dominique Schröder |
| Waiting for CSP — Securing Legacy Web Applications with JSAgents |
| Joerg Schwenk, Mario Heiderich and Marcus Niemietz |
| Web-to-Application Injection Attacks on Android: Characterization and Detection |
| Behnaz Hassanshahi, Yaoqi Jia, Roland Yap, Prateek Saxena and Zhenkai Liang |