| 2016 | A multi-cloud based privacy-preserving data publishing scheme for the internet of things. Lei Yang, Abdulmalik Humayed, Fengjun Li |
| 2016 | A security analysis of automated chinese turing tests. Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan |
| 2016 | Adaptive encrypted traffic fingerprinting with bi-directional dependence. Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham |
| 2016 | Amplifying side channels through performance degradation. Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom |
| 2016 | An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices. Yang Shi, Wujing Wei, Zongjian He, Hongfei Fan |
| 2016 | Auror: defending against poisoning attacks in collaborative deep learning systems. Shiqi Shen, Shruti Tople, Prateek Saxena |
| 2016 | Bootstrapping and maintaining trust in the cloud. Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd |
| 2016 | CASTLE: CA signing in a touch-less environment. Stephanos Matsumoto, Samuel Steffen, Adrian Perrig |
| 2016 | CPAC: securing critical infrastructure with cyber-physical access control. Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler |
| 2016 | Catching predators at watering holes: finding and understanding strategically compromised websites. Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, Xiaofeng Wang, Zhou Li |
| 2016 | CoKey: fast token-based cooperative cryptography. Julian Horsch, Sascha Wessel, Claudia Eckert |
| 2016 | Code obfuscation against symbolic execution attacks. Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner |
| 2016 | Cypider: building community-based cyber-defense infrastructure for android malware detection. ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb |
| 2016 | Decomposition of MAC address structure for granular device inference. Jeremy Martin, Erik C. Rye, Robert Beverly |
| 2016 | Device fingerprinting for augmenting web authentication: classification and analysis of methods. Furkan Alaca, Paul C. van Oorschot |
| 2016 | ELAR: extremely lightweight auditing and repairing for cloud security. Tran Phuong Thao, Kazumasa Omote |
| 2016 | Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure. Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar |
| 2016 | EvilCoder: automated bug insertion. Jannik Pewny, Thorsten Holz |
| 2016 | FASE: functionality-aware security enforcement. Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara |
| 2016 | Formal security analysis of smart embedded systems. Farid Molazem Tabrizi, Karthik Pattabiraman |
| 2016 | Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. Manar Mohamed, Nitesh Saxena |
| 2016 | HERCULE: attack story reconstruction via community discovery on correlated log graph. Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu |
| 2016 | Inferring browser activity and status through remote monitoring of storage usage. Hyungsub Kim, Sangho Lee, Jong Kim |
| 2016 | Intelligent, automated red team emulation. Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf |
| 2016 | LMP: light-weighted memory protection with hardware assistance. Wei Huang, Zhen Huang, Dhaval Miyani, David Lie |
| 2016 | Life-experience passwords (LEPs). Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic |
| 2016 | Location-enhanced authentication using the IoT: because you cannot be in two places at once. Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis |
| 2016 | Multi-receiver GPS spoofing detection: error models and realization. Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper |
| 2016 | On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel |
| 2016 | Pileus: protecting user resources from vulnerable cloud services. Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger |
| 2016 | Practical and secure dynamic searchable encryption via oblivious access on distributed data structure. Thang Hoang, Attila Altay Yavuz, Jorge Guajardo |
| 2016 | Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016 Stephen Schwab, William K. Robertson, Davide Balzarotti |
| 2016 | Reliably determining data leakage in the presence of strong attackers. Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel |
| 2016 | RevProbe: detecting silent reverse proxies in malicious server infrastructures. Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero |
| 2016 | Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. Bo Chen, Shijie Jia, Luning Xia, Peng Liu |
| 2016 | ShieldFS: a self-healing, ransomware-aware filesystem. Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi |
| 2016 | Spicy: a unified deep packet inspection framework for safely dissecting all your data. Robin Sommer, Johanna Amann, Seth Hall |
| 2016 | Swords and shields: a study of mobile game hacks and existing defenses. Yuan Tian, Eric Yawei Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague |
| 2016 | The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu |
| 2016 | The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios. Nicholas Chang-Fong, Aleksander Essex |
| 2016 | The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface. Mark R. Beaumont, Jim McCarthy, Toby C. Murray |
| 2016 | Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena |
| 2016 | Timing-based reconnaissance and defense in software-defined networks. John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller |
| 2016 | Trace-free memory data structure forensics via past inference and future speculations. Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz |
| 2016 | Understanding and defending the binder attack surface in Android. Huan Feng, Kang G. Shin |
| 2016 | Using image saliency and regions of interest to encourage stronger graphical passwords. Mohammad N. AlShehri, Heather Crawford |
| 2016 | VTPin: practical VTable hijacking protection for binaries. Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos |
| 2016 | VulPecker: an automated vulnerability detection system based on code similarity analysis. Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu |
| 2016 | You can promote, but you can't hide: large-scale abused app detection in mobile app stores. Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang |