CCS A*

170 papers

YearTitle / Authors
2015(Un)linkable Pseudonyms for Governmental Databases.
Jan Camenisch, Anja Lehmann
2015A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2015A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols.
Peeter Laud, Jaak Randmets
2015A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings.
Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield
2015A Search Engine Backed by Internet-Wide Scanning.
Zakir Durumeric, David Adrian, Ariana Mirian, Michael D. Bailey, J. Alex Halderman
2015ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee
2015AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications.
Deguang Kong, Lei Cen, Hongxia Jin
2015An Empirical Study of Web Vulnerability Discovery Ecosystems.
Mingyi Zhao, Jens Grossklags, Peng Liu
2015Android Root and its Providers: A Double-Edged Sword.
Hang Zhang, Dongdong She, Zhiyun Qian
2015Authenticating Privately over Public Wi-Fi Hotspots.
Aldo Cassola, Erik-Oliver Blass, Guevara Noubir
2015Automated Analysis and Synthesis of Authenticated Encryption Schemes.
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
2015Automated Proofs of Pairing-Based Cryptography.
Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt
2015Automated Symbolic Proofs of Observational Equivalence.
David A. Basin, Jannik Dreier, Ralf Sasse
2015Automated Synthesis of Optimized Circuits for Secure Computation.
Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni
2015Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes.
Joseph A. Akinyele, Christina Garman, Susan Hohenberger
2015Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries.
Yehuda Lindell, Ben Riva
2015Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim
2015CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services.
Srdjan Matic, Platon Kotzias, Juan Caballero
2015CCFI: Cryptographically Enforced Control Flow Integrity.
Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières
2015CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray
2015CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content.
John Holowczak, Amir Houmansadr
2015Certified PUP: Abuse in Authenticode Code Signing.
Platon Kotzias, Srdjan Matic, Richard Rivera, Juan Caballero
2015Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards.
Carlo Meijer, Roel Verdult
2015Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound.
Xiao Wang, T.-H. Hubert Chan, Elaine Shi
2015Clean Application Compartmentalization with SOAAP.
Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson
2015CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions.
Guillaume Bonfante, José M. Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry
2015Constant Communication ORAM with Small Blocksize.
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
2015Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity.
Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos
2015Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Luyi Xing, Xiaolong Bai, Tongxin Li, Xiaofeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han
2015Cross-Site Search Attacks.
Nethanel Gelernter, Amir Herzberg
2015CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks.
Jonghyuk Song, Sangho Lee, Jong Kim
2015DEMO: Action Recommendation for Cyber Resilience.
Luke Rodriguez, Darren S. Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray
2015DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles.
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015Defeating IMSI Catchers.
Fabian van den Broek, Roel Verdult, Joeri de Ruiter
2015Demystifying Incentives in the Consensus Computer.
Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena
2015Deniable Key Exchanges for Secure Messaging.
Nik Unger, Ian Goldberg
2015Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications.
Oswaldo Olivo, Isil Dillig, Calvin Lin
2015Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies.
Florian Tramèr, Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday
2015Drops for Stuff: An Analysis of Reshipping Mule Scams.
Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna
2015Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance.
Xiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, Xiaofeng Wang, Diyue Bu
2015Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta
2015Exploiting Temporal Dynamics in Sybil Defenses.
Changchang Liu, Peng Gao, Matthew K. Wright, Prateek Mittal
2015Face/Off: Preventing Privacy Leakage From Photos in Social Networks.
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis
2015Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable).
Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
2015Fast Garbling of Circuits Under Standard Assumptions.
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
2015Fast Non-Malleable Commitments.
Hai Brenner, Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
2015Fast and Secure Three-party Computation: The Garbled Circuit Approach.
Payman Mohassel, Mike Rosulek, Ye Zhang
2015Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015).
Jorge Guajardo, Stefan Katzenbeisser
2015First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Roshan K. Thomas, Alvaro A. Cárdenas, Rakesh B. Bobba
2015FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications.
Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch
2015Fraud Detection through Graph-Based User Behavior Modeling.
Alex Beutel, Leman Akoglu, Christos Faloutsos
2015Frequency-Hiding Order-Preserving Encryption.
Florian Kerschbaum
2015From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu
2015From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting.
Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns
2015From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?
Moti Yung
2015From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu
2015GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.
Shay Gueron, Yehuda Lindell
2015GRECS: Graph Encryption for Approximate Shortest Distance Queries.
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
2015GUITAR: Piecing Together Android App GUIs from Memory Images.
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu
2015Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication.
Vireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang
2015HORNET: High-speed Onion Routing at the Network Layer.
Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig
2015Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, Xiaofeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace
2015Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads.
Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo
2015How to Use Bitcoin to Play Decentralized Poker.
Ranjit Kumaresan, Tal Moran, Iddo Bentov
2015Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin, Paul Zimmermann
2015Inference Attacks on Property-Preserving Encrypted Databases.
Muhammad Naveed, Seny Kamara, Charles V. Wright
2015Inlined Information Flow Monitoring for JavaScript.
Andrey Chudnov, David A. Naumann
2015Insecurity of Voice Solution VoLTE in LTE Mobile Networks.
Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang
2015IntegriDB: Verifiable SQL for Outsourced Databases.
Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
2015Introduction to Cryptocurrencies.
Stefan Dziembowski
2015It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Stephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz
2015Keynote Talk.
Edward W. Felten
2015LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code.
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu
2015Lattice Basis Reduction Attack against Physically Unclonable Functions.
Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik
2015Leakage-Abuse Attacks Against Searchable Encryption.
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
2015Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Olivier Pereira, François-Xavier Standaert, Srinivas Vivek
2015Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins.
Tim Ruffing, Aniket Kate, Dominique Schröder
2015Location-restricted Services Access Control Leveraging Pinpoint Waveforming.
Tao Wang, Yao Liu, Qingqi Pei, Tao Hou
2015Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi
2015MIST 2015: 7th International Workshop on Managing Insider Security Threats.
Ilsun You, Elisa Bertino
2015MTD 2015: Second ACM Workshop on Moving Target Defense.
George Cybenko, Dijiang Huang
2015MalGene: Automatic Extraction of Malware Analysis Evasion Signature.
Dhilung Kirat, Giovanni Vigna
2015Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Thomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis
2015Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks.
Mihir Bellare, Joseph Jaeger, Daniel Kane
2015Micropayments for Decentralized Currencies.
Rafael Pass, Abhi Shelat
2015Mitigating Storage Side Channels Using Statistical Privacy Mechanisms.
Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang
2015Moat: Verifying Confidentiality of Enclave Programs.
Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani
2015Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Matt Fredrikson, Somesh Jha, Thomas Ristenpart
2015Monte Carlo Strength Evaluation: Fast and Reliable Password Checking.
Matteo Dell'Amico, Maurizio Filippone
2015Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration.
Soo-Jin Moon, Vyas Sekar, Michael K. Reiter
2015Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elaine Shi
2015Observing and Preventing Leakage in MapReduce.
Olga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, Divya Sharma
2015On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.
Tibor Jager, Jörg Schwenk, Juraj Somorovsky
2015Optimal Distributed Password Verification.
Jan Camenisch, Anja Lehmann, Gregory Neven
2015POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations.
Fengjun Li, Xin Fu, Bo Luo
2015POSTER: A Logic Based Network Forensics Model for Evidence Analysis.
Anoop Singhal, Changwei Liu, Duminda Wijesekera
2015POSTER: A Password-based Authentication by Splitting Roles of User Interface.
Jungseung Lee, Han Park, GyeongYong Bang, JooSeok Song
2015POSTER: Blackboard-Based Electronic Warfare System.
Jeremy Straub
2015POSTER: Computations on Encrypted Data in the Internet of Things Applications.
Laurynas Riliskis, Hossein Shafagh, Philip Alexander Levis
2015POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada
2015POSTER: Dynamic Labelling for Analyzing Security Protocols.
N. V. Narendra Kumar, R. K. Shyamasundar
2015POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites.
Samuel Jackson, Scott Kerlin, Jeremy Straub
2015POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Michael Backes, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow
2015POSTER: Lightweight Streaming Authenticated Data Structures.
Chia-Mu Yu
2015POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature.
Manh Huynh, Phuc Nguyen, Marco Gruteser, Tam Vu
2015POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications.
John Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith
2015POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Lihua Wang, Takuya Hayashi, Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai
2015POSTER: Page Table Manipulation Attack.
Jungseung Lee, HyoungMin Ham, Inhwan Kim, JooSeok Song
2015POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Tianyue Luo, Chen Ni, Qing Han, Mutian Yang, Jingzheng Wu, Yanjun Wu
2015POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDN.
Zheng Wang
2015POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations.
Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe
2015POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith
2015POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy.
Xing Liu, Wei Wang, Jiqiang Liu
2015POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use.
Depeng Li, Sachin Shetty
2015POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
Michael Backes, Oliver Schranz, Philipp von Styp-Rekowsky
2015POSTER: Using Unit Testing to Detect Sanitization Flaws.
Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford
2015POSTER: WinOver Enterprise Dark Data.
Manish Shukla, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, Sachin Lodha
2015POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Jingzheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Tianyue Luo, Yongji Wang
2015POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol.
Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou
2015Per-Input Control-Flow Integrity.
Ben Niu, Gang Tan
2015Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Yangyi Chen, Tongxin Li, Xiaofeng Wang, Kai Chen, Xinhui Han
2015Practical Context-Sensitive CFI.
Victor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, Cristiano Giuffrida
2015Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward.
Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang, Yan Huang
2015Privacy-Preserving Deep Learning.
Reza Shokri, Vitaly Shmatikov
2015Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015
Indrajit Ray, Ninghui Li, Christopher Kruegel
2015Program Analysis for Mobile Application Integrity and Privacy Enforcement.
Marco Pistoia
2015Protecting Locations with Differential Privacy under Temporal Correlations.
Yonghui Xiao, Li Xiong
2015Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges.
Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh
2015PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks.
Yasser Shoukry, Paul Martin, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava
2015SEDA: Scalable Embedded Device Attestation.
N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
2015SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web.
Daniel Fett, Ralf Küsters, Guido Schmitz
2015SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.
Glenn Wurster, David Lie
2015SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense.
Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman
2015SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users.
Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang
2015Secure Deduplication of Encrypted Data without Additional Independent Servers.
Jian Liu, N. Asokan, Benny Pinkas
2015Security by Any Other Name: On the Effectiveness of Provider Based Email Security.
Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko
2015Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng
2015Seeing through Network-Protocol Obfuscation.
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
2015Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao
2015Subversion-Resilient Signature Schemes.
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
2015Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence.
Mathias Lécuyer, Riley Spahn, Yannis Spiliopolous, Augustin Chaintreau, Roxana Geambasu, Daniel J. Hsu
2015Surpass: System-initiated User-replaceable Passwords.
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan
2015Symbolic Execution of Obfuscated Code.
Babak Yadegari, Saumya Debray
2015TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity.
Sven Schäge
2015Tampering with the Delivery of Blocks and Transactions in Bitcoin.
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
2015The Clock is Still Ticking: Timing Attacks in the Modern Web.
Tom van Goethem, Wouter Joosen, Nick Nikiforakis
2015The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras
2015The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript.
Pratik Soni, Enrico Budianto, Prateek Saxena
2015The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis
2015Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation.
Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia
2015Timely Rerandomization for Mitigating Memory Disclosures.
David Bigelow, Thomas Hobson, Robert Rudd, William W. Streilein, Hamed Okhravi
2015Towards Automatic Generation of Security-Centric Descriptions for Android Apps.
Mu Zhang, Yue Duan, Qian Feng, Heng Yin
2015Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content.
Aggelos Kiayias, Qiang Tang
2015Transparent Data Deduplication in the Cloud.
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef
2015TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing
2015Trusted Display on Untrusted Commodity Platforms.
Miao Yu, Virgil D. Gligor, Zongwei Zhou
2015UCognito: Private Browsing without Tears.
Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee
2015Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths.
Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan
2015Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data.
Dario Catalano, Dario Fiore
2015VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar
2015VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu
2015WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security.
Tomas Sander, Moti Yung
2015WPES 2015: The 14th Workshop on Privacy in the Electronic Society.
Nicholas Hopper, Rob Jansen
2015Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Qian Wang, Kui Ren, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou
2015WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers.
Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li
2015When Good Becomes Evil: Keystroke Inference with Smartwatch.
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang
2015Where's Wally?: Precise User Discovery Attacks in Location Proximity Services.
Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis
2015White-Box Cryptography Revisited: Space-Hard Ciphers.
Andrey Bogdanov, Takanori Isobe
2015Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security.
Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha
2015iRiS: Vetting Private API Abuse in iOS Applications.
Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu