| 2015 | A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks. Philippe Owezarski |
| 2015 | A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. Kenneth G. Paterson, Mario Strefler |
| 2015 | A Secure Communication Protocol for Drones and Smart Objects. Jongho Won, Seung-Hyun Seo, Elisa Bertino |
| 2015 | A Single Query Forgery Attack on Raviyoyla v1. Yuan Yao, Bin Zhang, Wenling Wu |
| 2015 | Access Control in Publicly Verifiable Outsourced Computation. James Alderman, Christian Janson, Carlos Cid, Jason Crampton |
| 2015 | Albatross: A Privacy-Preserving Location Sharing System. Gökay Saldamli, Richard Chow, Hongxia Jin |
| 2015 | An Empirical Analysis of ZeuS C&C Lifetime. Carlos Gañán, Orçun Çetin, Michel van Eeten |
| 2015 | Android Implicit Information Flow Demystified. Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang |
| 2015 | Anonymizing Social Graphs via Uncertainty Semantics. Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch |
| 2015 | Anonymous Yoking-Group Proofs. Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan |
| 2015 | AppPolicyModules: Mandatory Access Control for Third-Party Apps. Enrico Bacis, Simone Mutti, Stefano Paraboschi |
| 2015 | Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi |
| 2015 | Attribute-Based Access Control Models and Beyond. Ravi S. Sandhu |
| 2015 | Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism. Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque |
| 2015 | Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes. Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise |
| 2015 | Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps. Chaoshun Zuo, Jianliang Wu, Shanqing Guo |
| 2015 | Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification. Guanhua Yan |
| 2015 | Bittersweet ADB: Attacks and Defenses. Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu |
| 2015 | Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures. Gang Xu, George T. Amariucai, Yong Guan |
| 2015 | CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu |
| 2015 | Detecting Fingerprinted Data in TLS Traffic. Konstantin Böttinger, Dieter Schuster, Claudia Eckert |
| 2015 | Differentially Private Publishing of High-dimensional Data Using Sensitivity Control. Wei-Yen Day, Ninghui Li |
| 2015 | Disavowable Public Key Encryption with Non-interactive Opening. Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka |
| 2015 | Discover and Tame Long-running Idling Processes in Enterprise Systems. Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang |
| 2015 | Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability. Hao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng |
| 2015 | Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl |
| 2015 | Efficient Virtualization-Based Application Protection Against Untrusted Operating System. Yueqiang Cheng, Xuhua Ding, Robert H. Deng |
| 2015 | Emerging Security Threats and Countermeasures in IoT. Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh |
| 2015 | Enabling Encrypted Cloud Media Center with Secure Deduplication. Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui |
| 2015 | Enabling IP Protection for Outsourced Integrated Circuit Design. Xingliang Yuan, Cong Wang, Kui Ren |
| 2015 | Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates. Min Zheng, Hui Xue, Yulong Zhang, Tao Wei, John C. S. Lui |
| 2015 | Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection. Xiang Cai, Rucha Lale, Xin Cheng Zhang, Rob Johnson |
| 2015 | Formal Analysis of Enhanced Authorization in the TPM 2.0. Jianxiong Shao, Yu Qin, Dengguo Feng, Weijin Wang |
| 2015 | Group-oriented Proofs of Storage. Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou |
| 2015 | GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems. Huseyin Ulusoy, Pietro Colombo, Elena Ferrari, Murat Kantarcioglu, Erman Pattuk |
| 2015 | Hybrid User-level Sandboxing of Third-party Android Apps. Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang |
| 2015 | I Know Where You are: Proofs of Presence Resilient to Malicious Provers. Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula |
| 2015 | Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo |
| 2015 | JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification. Junjie Wang, Yinxing Xue, Yang Liu, Tian Huat Tan |
| 2015 | LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks. Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran |
| 2015 | Lucky 13 Strikes Back. Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar |
| 2015 | Measuring Botnets in the Wild: Some New Trends. Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen |
| 2015 | Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice. Yantian Hou, Ming Li, Ruchir Chauhan, Ryan M. Gerdes, Kai Zeng |
| 2015 | Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm. Jiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi |
| 2015 | NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU. David Nuñez, Isaac Agudo, Javier López |
| 2015 | Now You See Me: Hide and Seek in Physical Address Space. Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia |
| 2015 | On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile Devices. Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan |
| 2015 | On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data. Chris Y. T. Ma, David K. Y. Yau |
| 2015 | Practical Private One-way Anonymous Message Routing. Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake |
| 2015 | Privacy-Preserving Association Rule Mining in Cloud Computing. Xun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya |
| 2015 | Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn |
| 2015 | Related Randomness Attacks for Public Key Cryptosystems. Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu |
| 2015 | Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible. Haibo Tian, Fangguo Zhang, Kui Ren |
| 2015 | Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices. Paul-Edmond Berthier, Stéphane Cauchie, Zonghua Zhang |
| 2015 | Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen |
| 2015 | Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn. Nitin Chiluka, Nazareno Andrade, Johan A. Pouwelse, Henk J. Sips |
| 2015 | Software Watermarking using Return-Oriented Programming. Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao |
| 2015 | Systematic Low Leakage Coding for Physical Unclonable Functions. Matthias Hiller, Meng-Day (Mandel) Yu, Michael Pehl |
| 2015 | TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. Olivier Levillain, Baptiste Gourdin, Hervé Debar |
| 2015 | The Limits of Composable Crypto with Transferable Setup Devices. Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay |
| 2015 | The Performance Cost of Shadow Stacks and Stack Canaries. Thurston H. Y. Dang, Petros Maniatis, David A. Wagner |
| 2015 | The Power of Whispering: Near Field Assertions via Acoustic Communications. Lingjun Li, Guoliang Xue, Xinxin Zhao |
| 2015 | The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems. Marina Krotofil, Jason Larsen, Dieter Gollmann |
| 2015 | Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication. Daniel Arp, Fabian Yamaguchi, Konrad Rieck |
| 2015 | TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao |
| 2015 | Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu |
| 2015 | Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski |
| 2015 | TrustLogin: Securing Password-Login on Commodity Operating Systems. Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou |
| 2015 | Vehicular Platooning in an Adversarial Environment. Soodeh Dadras, Ryan M. Gerdes, Rajnikant Sharma |
| 2015 | Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation. Rong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren |
| 2015 | XiOS: Extended Application Sandboxing on iOS. Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi |
| 2015 | iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel. Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha |
| 2015 | k-Anonymization by Freeform Generalization. Katerina Doka, Mingqiang Xue, Dimitrios Tsoumakos, Panagiotis Karras |