| A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory | 
| Maximilian Seitzer, Michael Gruhn and Tilo Müller | 
| A Practical Approach for Adaptive Data Structure Layout Randomization | 
| Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu | 
| A Symmetric-Key Based Proofs of Retrievability Supporting Public Verification | 
| Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum and Jia Yu | 
| A Theory of Gray Security Policies | 
| Donald Ray and Jay Ligatti | 
| Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud | 
| Jianting Ning, Zhenfu Cao, Xiaolei Dong and Lifei Wei | 
| Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments | 
| Sufatrio, Tong-Wei Chua, Darell J. J. Tan and Vrizlynn L. L. Thing | 
| All Your Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines | 
| Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena | 
| Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web | 
| Daniel Fett, Ralf Kuesters and Guido Schmitz | 
| Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key | 
| Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo | 
| Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure | 
| Tobias Pulls and Roel Peeters | 
| Batch Verifiable Computation of Polynomials on Outsourced Data | 
| Liang Feng Zhang and Reihaneh Safavi-Naini | 
| Challenging the Trustworthyness of PGP: Is the Web-of-Trust Tear-proof? | 
| Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi and Stefano Sanfilippo | 
| Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution | 
| Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey Foster and Michael Clarkson | 
| Checking trace equivalence: How to get rid of nonces? | 
| Rémy Chrétien, Veronique Cortier and Stephanie Delaune | 
| CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud | 
| Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du and Zhibo Wang | 
| Computational Soundness for Interactive Primitives | 
| Michael Backes, Esfandiar Mohammadi and Tim Ruffing | Confidence analysis for nuclear arms control: SMT abstractions of Bayesian Belief Networks | 
| Paul Beaumont, Neil Evans, Michael Huth and Tom Plant | 
| DexHunter: Toward Extracting Hidden Code from Packed Android Applications | 
| Yueqian Zhang, Xiapu Luo and Haoyang Yin | 
| DNS-Scopy: Towards Security of Internet Naming Infrastructure | 
| Haya Shulman and Michael Waidner | 
| DTLS-HIMMO: Achieving DTLS certificate security with symmetric key overhead | 
| Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose-Luis Torre-Arce | 
| Efficient Message Authentication Codes with Combinatorial Group Testing | 
| Kazuhiko Minematsu | 
| Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings | 
| Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak | 
| Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records | 
| Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang | 
| Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks | 
| Raja Naeem Akram and Konstantinos Markantonakis | 
| Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption | 
| Yanjiang Yang, Joseph Liu, Alexander Liang, Raymond Choo and Jianying Zhou | 
| Factorization of Behavioral Integrity | 
| Ximeng Li, Flemming Nielson and Hanne Riis Nielson | 
| FP-Block: usable web privacy by controlling browser fingerprinting | 
| Christof Torres, Hugo Jonker and Sjouke Mauw | 
| Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software | 
| Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena | 
| Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions | 
| Gildas Avoine, Xavier Carpent and Cédric Lauradoux | 
| Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users | 
| Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Chris Gates and Ninghui Li | 
| Leveraging Real-Life Facts to Make Random Passwords More Memorable | 
| Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright and Shannon Scielzo | 
| Lightweight and Flexible Trust Assessment Modules for the Internet of Things | 
| Jan Tobias Muehlberg, Job Noorman and Frank Piessens | 
| Making any Identity Based Encryption Accountable, Efficiently | 
| Aggelos Kiayias and Qiang Tang | 
| Making Bitcoin Exchanges Transparent | 
| Christian Decker, James Guthrie, Jochen Seidel and Roger Wattenhofer | 
| Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections | 
| Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang and Zhou Li | 
| Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification | 
| Marina Blanton and Siddharth Saraph | 
| On Security of Content-based Video Stream Authentication | 
| Swee-Won Lo, Zhuo Wei, Robert Deng and Xuhua Ding | 
| On the Fly Design and Co-simulation of Responses against Simultaneous Attacks | 
| Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun and Samuel Dubus | 
| Practical Memory Deduplication Attacks in Sandboxed Javascript | 
| Daniel Gruss, David Bidner and Stefan Mangard | 
| Practical Threshold Password-Authenticated Secret Sharing Protocol | 
| Xun Yi, Feng Hao, Liqun Chen and Joseph Liu | 
| Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions | 
| Qiang Tang and Jun Wang | 
| Privacy-Preserving Link Prediction in Decentralized Online Social Networks | 
| Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou | 
| Privacy-Preserving Observation in Public Spaces | 
| Florian Kerschbaum and Hoon Wei Lim | 
| Rich Queries on Encrypted Data: Beyond Exact Matches | 
| Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel C. Rosu and Michael Steiner | 
| Server-Aided Revocable Identity-Based Encryption | 
| Baodong Qin, Robert Deng, Yingjiu Li and Shengli Liu | 
| Short Accountable Ring Signatures Based on DDH | 
| Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth and Christophe Petit | 
| Should Cyber-Insurance Providers Invest in Software Security? | 
| Aron Laszka and Jens Grossklags | 
| Small Subgroup Attacks on TLS-ECDH | 
| Tibor Jager, Jörg Schwenk and Juraj Somorovsky | 
| Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards | 
| Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Rong Fu and Xinjun Xie | 
| The Emperor’s New Password Creation Policies | 
| Ding Wang and Ping Wang | 
| Towards Attack-Resistant Peer-Assisted Indoor Localization | 
| Jingyu Hua, Shaoyong Du and Sheng Zhong | 
| Transforming Out Timing Leaks, More or Less | 
| Heiko Mantel and Artem Starostin | 
| Trustworthy prevention of code injection in Linux on embedded devices | 
| Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam and Patrik Ekdahl | 
| Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment | 
| Omar Almousa, Sebastian A. Mödersheim, Paolo Modesti and Luca Viganò | 
| Updatable Hash Proof System and Its Applications | 
| Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu and Zuoxia Yu | 
| vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge | 
| Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang and Luning Xia | 
| Verifiably Encrypted Signatures: Security Revisited and a New Construction | 
| Christian Hanser, Max Rabkin and Dominique Schröder | 
| Waiting for CSP — Securing Legacy Web Applications with JSAgents | 
| Joerg Schwenk, Mario Heiderich and Marcus Niemietz | 
| Web-to-Application Injection Attacks on Android: Characterization and Detection | 
| Behnaz Hassanshahi, Yaoqi Jia, Roland Yap, Prateek Saxena and Zhenkai Liang | 
