| 2015 | A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers. Stefan Craß, Gerson Joskowicz, Eva Kühn |
| 2015 | A Markov Random Field Approach to Automated Protocol Signature Inference. Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang |
| 2015 | A Novel Clustering Algorithm for Database Anomaly Detection. Jinkun Geng, Daren Ye, Ping Luo, Pin Lv |
| 2015 | A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam, Muhammad Khurram Khan, Kim-Kwang Raymond Choo |
| 2015 | An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun |
| 2015 | An Effective t-way Test Data Generation Strategy. Khandakar Rabbi, Quazi Mamun |
| 2015 | An Improved Method for Anomaly-Based Network Scan Detection. Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier |
| 2015 | Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing. Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu |
| 2015 | Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability. Xing Zhang, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu |
| 2015 | Community-Based Collaborative Intrusion Detection. Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer |
| 2015 | Defeating Kernel Driver Purifier. Jidong Xiao, Hai Huang, Haining Wang |
| 2015 | Detection, Classification and Characterization of Android Malware Using API Data Dependency. Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao |
| 2015 | Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. Lei Yang, Fengjun Li |
| 2015 | FineDroid: Enforcing Permissions with System-Wide Application Execution Context. Yuan Zhang, Min Yang, Guofei Gu, Hao Chen |
| 2015 | Generation of Transmission Control Rules Compliant with Existing Access Control Policies. Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill |
| 2015 | How to Prevent to Delegate Authentication. Mohsen Alimomeni, Reihaneh Safavi-Naini |
| 2015 | Human Surveillance System for Security Application. Mozammel Chowdhury, Junbin Gao, Rafiqul Islam |
| 2015 | Image Spam Classification Using Neural Network. Mozammel Chowdhury, Junbin Gao, Morshed U. Chowdhury |
| 2015 | Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander |
| 2015 | Kernel Data Attack Is a Realistic Security Threat. Jidong Xiao, Hai Huang, Haining Wang |
| 2015 | KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices. André Ebert, Chadly Marouane, Benno Rott, Martin Werner |
| 2015 | POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection. Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin |
| 2015 | POSTER: A Security Adaptive Steganography System Applied on Digital Audio. Xuejie Ding, Wei-qing Huang, Meng Zhang, Jianlin Zhao |
| 2015 | POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng |
| 2015 | POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks. Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund |
| 2015 | POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems. Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou |
| 2015 | POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu |
| 2015 | POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET. Karim Emara, Wolfgang Woerndl, Johann H. Schlichter |
| 2015 | POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure. Vitaly Ford, Ambareen Siraj |
| 2015 | POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths. Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani |
| 2015 | POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai |
| 2015 | Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems. Hong Liu, Hongmin Li, Eugene Y. Vasserman |
| 2015 | Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
| 2015 | RScam: Cloud-Based Anti-Malware via Reversible Sketch. Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen |
| 2015 | Remote Activation of Hardware Trojans via a Covert Temperature Channel. Priyabrat Dash, Chris Perkins, Ryan M. Gerdes |
| 2015 | Resource Efficient Privacy Preservation of Online Social Media Conversations. Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy |
| 2015 | Route Leaks Identification by Detecting Routing Loops. Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li |
| 2015 | Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. M. Arif Khan, Rafiqul Islam |
| 2015 | Securing Application with Software Partitioning: A Case Study Using SGX. Ahmad Atamli-Reineh, Andrew P. Martin |
| 2015 | Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems. Ben Townsend, Jemal H. Abawajy |
| 2015 | Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers Bhavani Thuraisingham, Xiaofeng Wang, Vinod Yegneswaran |
| 2015 | SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications. Lin Yan, Yao Guo, Xiangqun Chen |
| 2015 | SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen |
| 2015 | TADOOP: Mining Network Traffic Anomalies with Hadoop. Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu |
| 2015 | Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen |
| 2015 | Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu |
| 2015 | Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar |
| 2015 | Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS. Juan D. Parra Rodriguez, Joachim Posegga |
| 2015 | You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic. Dae Wook Kim, Junjie Zhang |