| 2016 | A Class of Precomputation-Based Distance-Bounding Protocols. Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua |
| 2016 | AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic |
| 2016 | Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. Alex Biryukov, Daniel Dinu, Dmitry Khovratovich |
| 2016 | CacheKit: Evading Memory Introspection Using Cache Incoherence. Ning Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou |
| 2016 | Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on. Christian Mainka, Vladislav Mladenov, Jörg Schwenk |
| 2016 | Explicit Secrecy: A Policy for Taint Tracking. Daniel Schoepe, Musard Balliu, Benjamin C. Pierce, Andrei Sabelfeld |
| 2016 | Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. Eyal Ronen, Adi Shamir |
| 2016 | Fine-Grained Control-Flow Integrity for Kernel Software. Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger |
| 2016 | Foundations of Hardware-Based Attested Computation and Application to SGX. Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi |
| 2016 | Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. Benjamin Mood, Debayan Gupta, Henry Carter, Kevin R. B. Butler, Patrick Traynor |
| 2016 | Games without Frontiers: Investigating Video Games as a Covert Channel. Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson |
| 2016 | Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. Ashokkumar C., Ravi Prakash Giri, Bernard L. Menezes |
| 2016 | Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu |
| 2016 | HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. Stefano Calzavara, Ilya Grishchenko, Matteo Maffei |
| 2016 | How Secure is TextSecure? Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz |
| 2016 | I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis |
| 2016 | IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016 |
| 2016 | It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe. Sylvain Frey, Yehia Elkhatib, Awais Rashid, Karolina Follis, John Edward Vidler, Nicholas J. P. Race, Christopher Edwards |
| 2016 | NavigaTor: Finding Faster Paths to Anonymity. Robert Annessi, Martin Schmiedecker |
| 2016 | On the Inference of User Paths from Anonymized Mobility Data. Galini Tsoukaneri, George Theodorakopoulos, Hugh Leather, Mahesh K. Marina |
| 2016 | PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. Pawel Szalachowski, Laurent Chuat, Adrian Perrig |
| 2016 | Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond. Celina G. Val, Michael A. Enescu, Sam Bayless, William Aiello, Alan J. Hu |
| 2016 | Reasoning about Object Capabilities with Logical Relations and Effect Parametricity. Dominique Devriese, Lars Birkedal, Frank Piessens |
| 2016 | Security Analysis of Re-Encryption RPC Mix Nets. Ralf Küsters, Tomasz Truderung |
| 2016 | Strong and Provably Secure Database Access Control. Marco Guarnieri, Srdjan Marinovic, David A. Basin |
| 2016 | Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi |
| 2016 | The Limitations of Deep Learning in Adversarial Settings. Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami |
| 2016 | The OPTLS Protocol and TLS 1.3. Hugo Krawczyk, Hoeteck Wee |
| 2016 | To Du or Not to Du: A Security Analysis of Du-Vote. Steve Kremer, Peter B. Rønne |
| 2016 | Translingual Obfuscation. Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu |
| 2016 | ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade |