| 2015 | A Principled Approach for ROP Defense. Rui Qiao, Mingwei Zhang, R. Sekar |
| 2015 | Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu |
| 2015 | Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten |
| 2015 | AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli |
| 2015 | BareDroid: Large-Scale Analysis of Android Apps on Real Devices. Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna |
| 2015 | Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng |
| 2015 | Combining Differential Privacy and Secure Multiparty Computation. Martin Pettai, Peeter Laud |
| 2015 | Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks. Mingwei Zhang, R. Sekar |
| 2015 | Covert Botnet Command and Control Using Twitter. Nick Pantic, Mohammad Iftekhar Husain |
| 2015 | Cross-Site Framing Attacks. Nethanel Gelernter, Yoel Grinstein, Amir Herzberg |
| 2015 | Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks. Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani |
| 2015 | Defeating ROP Through Denial of Stack Pivot. Aravind Prakash, Heng Yin |
| 2015 | Defending Against Malicious USB Firmware with GoodUSB. Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler |
| 2015 | DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis |
| 2015 | Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks. Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang |
| 2015 | Entity-Based Access Control: supporting more expressive access control policies. Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen |
| 2015 | ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford |
| 2015 | Evaluating the Flexibility of the Java Sandbox. Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine |
| 2015 | Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara |
| 2015 | Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit. Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato |
| 2015 | Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi |
| 2015 | Handling Reboots and Mobility in 802.15.4 Security. Konrad-Felix Krentz, Christoph Meinel |
| 2015 | Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics. Letitia W. Li, Guillaume Duc, Renaud Pacalet |
| 2015 | Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. Adam J. Aviv, Devon Budzitowski, Ravi Kuber |
| 2015 | JaTE: Transparent and Efficient JavaScript Confinement. Tung Tran, Riccardo Pelizzi, R. Sekar |
| 2015 | Know Your Achilles' Heel: Automatic Detection of Network Critical Services. Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel |
| 2015 | Logical Partitions on Many-Core Platforms. Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun |
| 2015 | MOSE: Live Migration Based On-the-Fly Software Emulation. Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim |
| 2015 | MobiPluto: File System Friendly Deniable Storage for Mobile Devices. Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang |
| 2015 | MorphDroid: Fine-grained Privacy Verification. Pietro Ferrara, Omer Tripp, Marco Pistoia |
| 2015 | On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto |
| 2015 | On the Security and Usability of Crypto Phones. Maliheh Shirvanian, Nitesh Saxena |
| 2015 | PARS: A Uniform and Open-source Password Analysis and Research System. Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah |
| 2015 | PIE: Parser Identification in Embedded Systems. Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti |
| 2015 | Privacy-preserving Virtual Machine. Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan |
| 2015 | Proactive Security Analysis of Changes in Virtualized Infrastructures. Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim |
| 2015 | Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015 |
| 2015 | Provenance-based Integrity Protection for Windows. Wai-Kit Sze, R. Sekar |
| 2015 | Proximity Verification for Contactless Access Control and Authentication Systems. Aanjhan Ranganathan, Boris Danev, Srdjan Capkun |
| 2015 | Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. Maarten Decat, Bert Lagaisse, Wouter Joosen |
| 2015 | SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases. Simone Mutti, Enrico Bacis, Stefano Paraboschi |
| 2015 | Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. Peter Mayer, Melanie Volkamer |
| 2015 | ShrinkWrap: VTable Protection without Loose Ends. István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos |
| 2015 | Soteria: Offline Software Protection within Low-cost Embedded Devices. Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede |
| 2015 | Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services. Chen Cao, Neng Gao, Peng Liu, Ji Xiang |
| 2015 | Using Channel State Information for Tamper Detection in the Internet of Things. Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick |
| 2015 | Using Visual Challenges to Verify the Integrity of Security Cameras. Junia Valente, Alvaro A. Cárdenas |
| 2015 | Vulnerability Assessment of OAuth Implementations in Android Applications. Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu |