| 2014 | (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi |
| 2014 | A Computationally Complete Symbolic Attacker for Equivalence Properties. Gergei Bana, Hubert Comon-Lundh |
| 2014 | A Critical Evaluation of Website Fingerprinting Attacks. Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt |
| 2014 | A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning. Nektarios Leontiadis, Tyler Moore, Nicolas Christin |
| 2014 | A New Additive Homomorphic Encryption based on the co-ACD Problem. Jung Hee Cheon, Hyung Tae Lee, Jae Hong Seo |
| 2014 | A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg |
| 2014 | A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel. Anil Kurmus, Robby Zippel |
| 2014 | A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation. Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone |
| 2014 | A11y Attacks: Exploiting Accessibility in Operating Systems. Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee |
| 2014 | ALETHEIA: Improving the Usability of Static Security Analysis. Omer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Y. Aravkin |
| 2014 | ALITHEIA: Towards Practical Verifiable Graph Processing. Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz |
| 2014 | ARMlock: Hardware-based Fault Isolation for ARM. Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang |
| 2014 | ARPKI: Attack Resilient Public-Key Infrastructure. David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski |
| 2014 | ATRA: Address Translation Redirection Attack against Hardware-based External Monitors. DaeHee Jang, Hojoon Lee, Minsu Kim, Daehyeok Kim, Daegyeong Kim, Brent ByungHoon Kang |
| 2014 | AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis. Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu |
| 2014 | Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang |
| 2014 | Algebraic MACs and Keyed-Verification Anonymous Credentials. Melissa Chase, Sarah Meiklejohn, Greg Zaverucha |
| 2014 | Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. Fengguo Wei, Sankardas Roy, Xinming Ou, Robby |
| 2014 | An Epidemiological Study of Malware Encounters in a Large Enterprise. Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels |
| 2014 | Are You Ready to Lock? Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner |
| 2014 | AutoCog: Measuring the Description-to-permission Fidelity in Android Applications. Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen |
| 2014 | Automating Information Flow Analysis of Low Level Code. Musard Balliu, Mads Dam, Roberto Guanciale |
| 2014 | Beware, Your Hands Reveal Your Secrets! Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha |
| 2014 | Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection. Lorenzo De Carli, Robin Sommer, Somesh Jha |
| 2014 | Blind Recognition of Touched Keys on Mobile Devices. Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao |
| 2014 | Blind Transmitter Authentication for Spectrum Security and Enforcement. Vireshwar Kumar, Jung-Min Park, Kaigui Bian |
| 2014 | Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering. Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Platzer, Wolfgang Kastner |
| 2014 | CCS'14 Co-Located Workshop Summary for SPSM 2014. Kapil Singh, Zhenkai Liang |
| 2014 | CCSW 2014: Sixth ACM Cloud Computing Security Workshop. Alina Oprea, Reihaneh Safavi-Naini |
| 2014 | Characterization of Real-Life PRNGs under Partial State Corruption. Mario Cornejo, Sylvain Ruhault |
| 2014 | Characterizing Large-Scale Click Fraud in ZeroAccess. Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker |
| 2014 | ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces. Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms |
| 2014 | Client-Controlled Cloud Encryption. Florian Kerschbaum |
| 2014 | Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals. Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis |
| 2014 | Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation. Xing Jin, Xunchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri |
| 2014 | Code Reuse Attacks in PHP: Automated POP Chain Generation. Johannes Dahse, Nikolai Krein, Thorsten Holz |
| 2014 | Collaborative Verification of Information Flow for a High-Assurance App Store. Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu |
| 2014 | Community-Enhanced De-anonymization of Online Social Networks. Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn |
| 2014 | Consequences of Connectivity: Characterizing Account Hijacking on Twitter. Kurt Thomas, Frank Li, Chris Grier, Vern Paxson |
| 2014 | Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani |
| 2014 | Context-free Attacks Using Keyboard Acoustic Emanations. Tong Zhu, Qiang Ma, Shanfeng Zhang, Yunhao Liu |
| 2014 | Controlled Functional Encryption. Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter |
| 2014 | Cross-Tenant Side-Channel Attacks in PaaS Clouds. Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart |
| 2014 | DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans. Jie Zhang, Feng Yuan, Qiang Xu |
| 2014 | Deanonymisation of Clients in Bitcoin P2P Network. Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov |
| 2014 | Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick N. Lawlor, David M. Liebovitz, Bradley A. Malin |
| 2014 | Demo Overview: Privacy-Enhancing Features of IdentiDroid. Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino |
| 2014 | Deniable Liaisons. Abhinav Narain, Nick Feamster, Alex C. Snoeren |
| 2014 | Detection of On-Road Vehicles Emanating GPS Interference. Gorkem Kar, Hossen Asiful Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu |
| 2014 | Dialing Back Abuse on Phone Verified Accounts. Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy |
| 2014 | Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components. Anupam Das, Nikita Borisov, Matthew Caesar |
| 2014 | Efficiently Verifiable Computation on Encrypted Data. Dario Fiore, Rosario Gennaro, Valerio Pastro |
| 2014 | Exciting Security Research Opportunity: Next-generation Internet. Adrian Perrig |
| 2014 | Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis |
| 2014 | Fail-Secure Access Control. Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin |
| 2014 | Formatted Encryption Beyond Regular Languages. Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, Somesh Jha |
| 2014 | Founding Digital Currency on Secure Computation. Karim El Defrawy, Joshua Lampkins |
| 2014 | Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014). Frederik Armknecht, Jorge Guajardo |
| 2014 | From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser |
| 2014 | Fully Secure and Fast Signing from Obfuscation. Kim Ramchen, Brent Waters |
| 2014 | Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel |
| 2014 | Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers. Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith |
| 2014 | How to Use Bitcoin to Incentivize Correct Computations. Ranjit Kumaresan, Iddo Bentov |
| 2014 | Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen |
| 2014 | Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong |
| 2014 | Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code. Jeff Seibert, Hamed Okkhravi, Eric Söderström |
| 2014 | Integrity, Consistency, and Verification of Remote Computation. Christian Cachin |
| 2014 | Location Privacy Protection for Smartphone Users. Kassem Fawaz, Kang G. Shin |
| 2014 | MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications. Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan |
| 2014 | MTD 2014: First ACM Workshop on Moving Target Defense. Sushil Jajodia, Kun Sun |
| 2014 | Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services. Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, Xiaofeng Wang, Xinhui Han |
| 2014 | Mechanized Network Origin and Path Authenticity Proofs. Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig |
| 2014 | Moving Targets: Security and Rapid-Release in Firefox. Sandy Clark, Michael Collis, Matt Blaze, Jonathan M. Smith |
| 2014 | Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila |
| 2014 | Multi-Stage Key Exchange and the Case of Google's QUIC Protocol. Marc Fischlin, Felix Günther |
| 2014 | OAuth Demystified for Mobile Application Developers. Eric Yawei Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague |
| 2014 | Oblivious Data Structures. Xiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang |
| 2014 | On The Security of Mobile Cockpit Information Systems. Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan A. Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko |
| 2014 | Optimal Average-Complexity Ideal-Security Order-Preserving Encryption. Florian Kerschbaum, Axel Schröpfer |
| 2014 | Optimal Geo-Indistinguishable Mechanisms for Location Privacy. Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi |
| 2014 | Optimizing Obfuscation: Avoiding Barrington's Theorem. Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai |
| 2014 | Outsourced Proofs of Retrievability. Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter |
| 2014 | POSTER: A Hybrid Botnet Ecological Environment. Dai Yumei, Liang Yu, Li Ke |
| 2014 | POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System. Ke Li, Chaoge Liu, Xiang Cui |
| 2014 | POSTER: A Measurement Framework to Quantify Software Protections. Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens |
| 2014 | POSTER: A Proactive Cloud-Based Cross-Reference Forensic Framework. Zhenbang Liu, Hengming Zou |
| 2014 | POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting. Dong Li, Fangjiao Zhang, Chaoge Liu |
| 2014 | POSTER: AdHoneyDroid - Capture Malicious Android Advertisements. Dongqi Wang, Shuaifu Dai, Yu Ding, Tongxin Li, Xinhui Han |
| 2014 | POSTER: An E2E Trusted Cloud Infrastructure. Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu |
| 2014 | POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems. Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin P. Heaslip |
| 2014 | POSTER: Analyzing Access Control Policies with SMT. Fatih Turkmen, Jerry den Hartog, Nicola Zannone |
| 2014 | POSTER: Android System Broadcast Actions Broadcasts Your Privacy. Fadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, Abeer Al Jarrah |
| 2014 | POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng |
| 2014 | POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification. Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang |
| 2014 | POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks. Lei Jin, Balaji Palanisamy, James B. D. Joshi |
| 2014 | POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption. Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo |
| 2014 | POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data. Yu Zhang, Songfeng Lu |
| 2014 | POSTER: Enhancing Security and Privacy with Google Glass. Johannes Krupp, Dominique Schröder, Mark Simkin |
| 2014 | POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption. Fuchun Guo, Willy Susilo, Yi Mu |
| 2014 | POSTER: Fingerprinting the Publicly Available Sandboxes. Ke Liu, Shuai Lu, Chaoge Liu |
| 2014 | POSTER: How Distributed Are Today's DDoS Attacks? An Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen |
| 2014 | POSTER: LocMask: A Location Privacy Protection Framework in Android System. Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren |
| 2014 | POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering. Hongliang Yu, Yong Zhao, Gang Xiong, Li Guo, Zhen Li, Yong Wang |
| 2014 | POSTER: Misuseablity Analysis for IT Infrastructure. Asaf Shabtai, Yuval Elovici |
| 2014 | POSTER: On the Capability of DNS Cache Poisoning Attacks. Zheng Wang |
| 2014 | POSTER: On the Resilience of DNS Infrastructure. Haya Schulmann, Shiran Ezra |
| 2014 | POSTER: Password Entering and Transmission Security. Gamze Canova, Melanie Volkamer, Simon Weiler |
| 2014 | POSTER: Positioning Attack on Proximity-Based People Discovery. Huan Feng, Kang G. Shin |
| 2014 | POSTER: Proactive Blacklist Update for Anti-Phishing. Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng |
| 2014 | POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs. Asmaa Sallam, Elisa Bertino |
| 2014 | POSTER: Quasi-ID: In fact, I am a human. Milivoj Simeonovski |
| 2014 | POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization. Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang |
| 2014 | POSTER: Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection Logs. Jyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, Chung-Tsai Su |
| 2014 | POSTER: Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control Policies. Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe |
| 2014 | POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan. Mitsuhiro Hatada, Masato Terada, Tatsuya Mori |
| 2014 | POSTER: Study of Software Plugin-based Malware. Yu Liang, Zhiqiao Li, Xiang Cui |
| 2014 | POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP. Xiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang |
| 2014 | POSTER: TLS Proxies: Friend or Foe? Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala |
| 2014 | POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine. Jie Lin, Chuanyi Liu, Binxing Fang |
| 2014 | POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities. Jiayi Ye, Chao Zhang, Xinhui Han |
| 2014 | POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng |
| 2014 | POSTER: When and How to Implicitly Authenticate Smartphone Users. Aaron Atwater, Hassan Khan, Urs Hengartner |
| 2014 | PixelVault: Using GPUs for Securing Cryptographic Operations. Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis |
| 2014 | PoliCert: Secure and Flexible TLS Certificate Management. Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig |
| 2014 | Practical UC security with a Global Random Oracle. Ran Canetti, Abhishek Jain, Alessandra Scafuro |
| 2014 | PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. Tariq Elahi, George Danezis, Ian Goldberg |
| 2014 | Privacy Beyond Confidentiality. Christopher W. Clifton |
| 2014 | Private-by-Design Advertising Meets the Real World. Alexey Reznichenko, Paul Francis |
| 2014 | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 Gail-Joon Ahn, Moti Yung, Ninghui Li |
| 2014 | Quantifying Web-Search Privacy. Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders |
| 2014 | RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova |
| 2014 | Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging. Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu |
| 2014 | Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum |
| 2014 | RevCast: Fast, Private Certificate Revocation over FM Radio. Aaron Schulman, Dave Levin, Neil Spring |
| 2014 | RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. Ben Niu, Gang Tan |
| 2014 | Rosemary: A Robust, Secure, and High-performance Network Operating System. Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, JaeWoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang |
| 2014 | Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. Min Suk Kang, Virgil D. Gligor |
| 2014 | S3: A Symbolic String Solver for Vulnerability Detection in Web Applications. Minh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar |
| 2014 | SCORAM: Oblivious RAM for Secure Computation. Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi |
| 2014 | SIW 2014: First Workshop on Security Information Workers. Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle |
| 2014 | Searchable Encryption with Secure and Efficient Updates. Florian Hahn, Florian Kerschbaum |
| 2014 | Second Smart Energy Grid Security Workshop (SEGS 2014). Klaus Kursawe, Benessa Defend |
| 2014 | Securing SSL Certificate Verification through Dynamic Linking. Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi |
| 2014 | Security Analyses of Click-based Graphical Passwords via Image Point Memorability. Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang |
| 2014 | Security Analysis of the Estonian Internet Voting System. Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Alex Halderman |
| 2014 | Security Vulnerability in Processor-Interconnect Router Design. WonJun Song, John Kim, Jae W. Lee, Dennis Abts |
| 2014 | Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs. Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao |
| 2014 | ShadowCrypt: Encrypted Web Applications for Everyone. Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, Dawn Xiaodong Song |
| 2014 | Structural Data De-anonymization: Quantification, Practice, and Implications. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah |
| 2014 | Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation. Ehab Al-Shaer, Krishna Kant |
| 2014 | Synthesis of Fault Attacks on Cryptographic Implementations. Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz |
| 2014 | System-level Non-interference for Constant-time Cryptography. Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie |
| 2014 | Taking Authenticated Range Queries to Arbitrary Dimensions. Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos |
| 2014 | The Last Mile: An Empirical Study of Timing Channels on seL4. David A. Cock, Qian Ge, Toby C. Murray, Gernot Heiser |
| 2014 | The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid. Mark S. Dittmer, Mahesh V. Tripunitara |
| 2014 | The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Díaz |
| 2014 | Toward Robust Hidden Volumes Using Write-Only Oblivious RAM. Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu |
| 2014 | Tutorial: Text Analytics for Security. William Enck, Tao Xie |
| 2014 | Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. Qiang Cao, Xiaowei Yang, Jieqi Yu, Christopher Palow |
| 2014 | VerSum: Verifiable Computations over Large Public Logs. Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich |
| 2014 | Verifying Curve25519 Software. Yu-Fang Chen, Chang-Hong Hsu, Hsin-hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang |
| 2014 | VoIP Fraud: Identifying a Wolf in Sheep's Clothing. Hemant Sengar |
| 2014 | Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks. Yu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin |
| 2014 | WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security. Tomas Sander |
| 2014 | WPES 2014: 13th Workshop on Privacy in the Electronic Society. Gail-Joon Ahn, Anupam Datta |
| 2014 | Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions. Yi Xu, Jan-Michael Frahm, Fabian Monrose |
| 2014 | Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. Maliheh Shirvanian, Nitesh Saxena |
| 2014 | Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security. Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein |
| 2014 | World-Driven Access Control for Continuous Sensing. Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang |
| 2014 | You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code. Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny |
| 2014 | Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee |