| 2015 | 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015 |
| 2015 | ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. Daniel Demmler, Thomas Schneider, Michael Zohner |
| 2015 | Bloom Cookies: Web Search Personalization without User Tracking. Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatowicz |
| 2015 | Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang |
| 2015 | CopperDroid: Automatic Reconstruction of Android Malware Behaviors. Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro |
| 2015 | DEFY: A Deniable, Encrypted File System for Log-Structured Storage. Timothy Peters, Mark A. Gondree, Zachary N. J. Peterson |
| 2015 | DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. Xueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing |
| 2015 | EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran |
| 2015 | EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen |
| 2015 | Efficient RAM and control flow in verifiable outsourced computation. Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish |
| 2015 | Exploiting and Protecting Dynamic Code Generation. Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski |
| 2015 | Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna |
| 2015 | FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers. Yves Younan |
| 2015 | Gracewipe: Secure and Verifiable Deletion under Coercion. Lianying Zhao, Mohammad Mannan |
| 2015 | I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser. Xiang Pan, Yinzhi Cao, Yan Chen |
| 2015 | Identifying Cross-origin Resource Status Using Application Cache. Sangho Lee, Hyungsub Kim, Jong Kim |
| 2015 | Information Flow Analysis of Android Applications in DroidSafe. Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, Martin C. Rinard |
| 2015 | Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. Mohamed El Massad, Siddharth Garg, Mahesh V. Tripunitara |
| 2015 | Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov |
| 2015 | Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose |
| 2015 | Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords. Benjamin Güldenring, Volker Roth, Lars Ries |
| 2015 | Machine Learning Classification over Encrypted Data. Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser |
| 2015 | Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. Pierre-Antoine Vervier, Olivier Thonnard, Marc Dacier |
| 2015 | NSEC5: Provably Preventing DNSSEC Zone Enumeration. Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv |
| 2015 | No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations. Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith |
| 2015 | On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah |
| 2015 | Opaque Control-Flow Integrity. Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin W. Hamlen, Michael Franz |
| 2015 | P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian |
| 2015 | Parking Sensors: Analyzing and Detecting Parked Domains. Thomas Vissers, Wouter Joosen, Nick Nikiforakis |
| 2015 | Phoneypot: Data-driven Understanding of Telephony Threats. Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad |
| 2015 | Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu |
| 2015 | Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms. Igor Bilogrevic, Kévin Huguenin, Stefan Mihaila, Reza Shokri, Jean-Pierre Hubaux |
| 2015 | Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic |
| 2015 | Preventing Use-after-free with Dangling Pointers Nullification. Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee |
| 2015 | Principled Sampling for Anomaly Detection. Brendan Juba, Christopher Musco, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard |
| 2015 | Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina |
| 2015 | Run-time Monitoring and Formal Analysis of Information Flows in Chromium. Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian |
| 2015 | SPHINX: Detecting Security Attacks in Software-Defined Networks. Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann |
| 2015 | SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang |
| 2015 | Securing the Software Defined Network Control Layer. Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran |
| 2015 | Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis |
| 2015 | Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta |
| 2015 | StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida |
| 2015 | The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis |
| 2015 | Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz |
| 2015 | Too LeJIT to Quit: Extending JIT Spraying to ARM. Wilson Lian, Hovav Shacham, Stefan Savage |
| 2015 | Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. Michael J. Kranch, Joseph Bonneau |
| 2015 | VTint: Protecting Virtual Function Tables' Integrity. Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song |
| 2015 | Verified Contributive Channel Bindings for Compound Authentication. Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti |
| 2015 | What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, Xiaofeng Wang, Carl A. Gunter |
| 2015 | vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. Aravind Prakash, Xunchao Hu, Heng Yin |