| 2014 | 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 Shiho Moriai, Trent Jaeger, Kouichi Sakurai |
| 2014 | A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability. Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen |
| 2014 | APKLancet: tumor payload diagnosis and purification for android applications. Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu |
| 2014 | Abstract model counting: a novel approach for quantification of information leaks. Quoc-Sang Phan, Pasquale Malacaria |
| 2014 | After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. Su Zhang, Xinwen Zhang, Xinming Ou |
| 2014 | ConXsense: automated context classification for context-aware access control. Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan |
| 2014 | Covert ephemeral communication in named data networking. Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik |
| 2014 | Cyber defenses for physical attacks and insider threats in cloud computing. Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee |
| 2014 | Design and evaluation of persea, a sybil-resistant DHT. Mahdi Nasrullah Al-Ameen, Matthew K. Wright |
| 2014 | Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan |
| 2014 | Differential privacy with δ-neighbourhood for spatial and dynamic datasets. Chengfang Fang, Ee-Chien Chang |
| 2014 | DroidRay: a security evaluation system for customized android firmwares. Min Zheng, Mingshen Sun, John C. S. Lui |
| 2014 | Efficient, context-aware privacy leakage confinement for android applications without firmware modding. Mu Zhang, Heng Yin |
| 2014 | Evading android runtime analysis via sandbox detection. Timothy Vidas, Nicolas Christin |
| 2014 | Fighting malicious code: an eternal struggle. Christopher Kruegel |
| 2014 | Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng |
| 2014 | How many down?: toward understanding systematic risk in networks. Benjamin Johnson, Aron Laszka, Jens Grossklags |
| 2014 | Improved anonymous proxy re-encryption with CCA security. Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang |
| 2014 | IntentFuzzer: detecting capability leaks of android applications. Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Hai-Xin Duan |
| 2014 | Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature. Fabian Lanze, Andriy Panchenko, Benjamin Braatz, Thomas Engel |
| 2014 | Malware detection with quantitative data flow graphs. Tobias Wüchner, Martín Ochoa, Alexander Pretschner |
| 2014 | Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li |
| 2014 | Modelling after-the-fact leakage for key exchange. Janaka Alawatugoda, Douglas Stebila, Colin Boyd |
| 2014 | Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen |
| 2014 | Multi-recipient encryption, revisited. Alexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt |
| 2014 | OTIT: towards secure provenance modeling for location proofs. Rasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan |
| 2014 | On the effectiveness of risk prediction based on users browsing behavior. Davide Canali, Leyla Bilge, Davide Balzarotti |
| 2014 | On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann |
| 2014 | Outsourceable two-party privacy-preserving biometric authentication. Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang |
| 2014 | PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello |
| 2014 | Practical secret key agreement for full-duplex near field communications. Rong Jin, Xianru Du, Zi Deng, Kai Zeng, Jing Xu |
| 2014 | Practical user authentication leveraging channel state information (CSI). Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen |
| 2014 | Privacy of outsourced k-means clustering. Dongxi Liu, Elisa Bertino, Xun Yi |
| 2014 | Privacy-preserving distance computation and proximity testing on earth, done right. Jaroslav Sedenka, Paolo Gasti |
| 2014 | Prospect: peripheral proxying supported embedded code testing. Markus Kammerstetter, Christian Platzer, Wolfgang Kastner |
| 2014 | Protecting users against XSS-based password manager abuse. Ben Stock, Martin Johns |
| 2014 | Prover anonymous and deniable distance-bounding authentication. Sébastien Gambs, Cristina Onete, Jean-Marc Robert |
| 2014 | Re Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar |
| 2014 | Remotely wiping sensitive data on stolen smartphones. Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing |
| 2014 | S-ORAM: a segmentation-based oblivious RAM. Jinsheng Zhang, Wensheng Zhang, Daji Qiao |
| 2014 | Scanner hunter: understanding HTTP scanning traffic. Guowu Xie, Huy Hang, Michalis Faloutsos |
| 2014 | Scanning of real-world web applications for parameter tampering vulnerabilities. Adonis P. H. Fung, Tielei Wang, K. W. Cheung, Tsz-Yeung Wong |
| 2014 | Shades of gray: a closer look at emails in the gray area. Jelena Isacenkova, Davide Balzarotti |
| 2014 | Sufficient conditions for vertical composition of security protocols. Sebastian Mödersheim, Luca Viganò |
| 2014 | The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape. Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna |
| 2014 | Towards automated protocol reverse engineering using semantic information. Georges Bossert, Frédéric Guihéry, Guillaume Hiet |
| 2014 | Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi |
| 2014 | Understanding OSN-based facial disclosure against face authentication systems. Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng |
| 2014 | VirtualSwindle: an automated attack against in-app billing on android. Collin Mulliner, William K. Robertson, Engin Kirda |
| 2014 | Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith |
| 2014 | YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. Tiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish, Sara B. Kiesler |
| 2014 | pTwitterRec: a privacy-preserving personalized tweet recommendation framework. Bisheng Liu, Urs Hengartner |