| 2015 | A Complete Characterization of Secure Human-Server Communication. David A. Basin, Sasa Radomirovic, Michael Schläpfer |
| 2015 | A Cut Principle for Information Flow. Joshua D. Guttman, Paul D. Rowe |
| 2015 | A Definitional Framework for Functional Encryption. Christian Matt, Ueli Maurer |
| 2015 | A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications. Michela Chessa, Jens Grossklags, Patrick Loiseau |
| 2015 | A Hybrid Approach for Proving Noninterference of Java Programs. Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr |
| 2015 | A Logic of Programs with Interface-Confined Code. Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta |
| 2015 | A Mechanized Proof of Security for Searchable Symmetric Encryption. Adam Petcher, Greg Morrisett |
| 2015 | A Methodology for Information Flow Experiments. Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing |
| 2015 | A Parametric Family of Attack Models for Proxy Re-encryption. David Nuñez, Isaac Agudo, Javier López |
| 2015 | An Analysis of Universal Information Flow Based on Self-Composition. Christian Müller, Máté Kovács, Helmut Seidl |
| 2015 | Analyzing First-Order Role Based Access Control. Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel |
| 2015 | Android Permissions Unleashed. Alessandro Armando, Roberto Carbone, Gabriele Costa, Alessio Merlo |
| 2015 | Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries. Martin Pettai, Peeter Laud |
| 2015 | BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici |
| 2015 | Compositional Typed Analysis of ARBAC Policies. Stefano Calzavara, Alvise Rabitti, Michele Bugliesi |
| 2015 | Cryptographic Enforcement of Language-Based Information Erasure. Aslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong |
| 2015 | Decidability of Trace Equivalence for Protocols with Nonces. Rémy Chrétien, Véronique Cortier, Stéphanie Delaune |
| 2015 | Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations. William C. Garrison III, Adam J. Lee |
| 2015 | Du-Vote: Remote Electronic Voting with Untrusted Computers. Gurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen, Michael R. Clarkson |
| 2015 | Flow-Limited Authorization. Owen Arden, Jed Liu, Andrew C. Myers |
| 2015 | Hybrid Monitors for Concurrent Noninterference. Aslan Askarov, Stephen Chong, Heiko Mantel |
| 2015 | IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015 Cédric Fournet, Michael W. Hicks, Luca Viganò |
| 2015 | Information Flow Control for Event Handling and the DOM in Web Browsers. Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer |
| 2015 | Location Privacy via Differential Private Perturbation of Cloaking Area. Hoa Ngo, Jong Kim |
| 2015 | On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor |
| 2015 | Picking vs. Guessing Secrets: A Game-Theoretic Analysis. M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa |
| 2015 | Policy Privacy in Cryptographic Access Control. Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi |
| 2015 | Probabilistic Program Modeling for High-Precision Anomaly Classification. Kui Xu, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian |
| 2015 | Program Actions as Actual Causes: A Building Block for Accountability. Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha |
| 2015 | Rational Protection against Timing Attacks. Goran Doychev, Boris Köpf |
| 2015 | Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework. Edelmira Pasarella, Jorge Lobo |
| 2015 | Set-Pi: Set Membership p-Calculus. Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson |
| 2015 | Symbolic Malleable Zero-Knowledge Proofs. Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina |
| 2015 | The Anatomy and Facets of Dynamic Policies. Niklas Broberg, Bart van Delft, David Sands |
| 2015 | Understanding and Enforcing Opacity. Daniel Schoepe, Andrei Sabelfeld |
| 2015 | Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language. Daniel Hedin, Luciano Bello, Andrei Sabelfeld |