| 2015 | 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 |
| 2015 | A Generic Approach to Automatic Deobfuscation of Executable Code. Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray |
| 2015 | A Messy State of the Union: Taming the Composite State Machines of TLS. Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue |
| 2015 | ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk |
| 2015 | Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab |
| 2015 | Automatic Inference of Search Patterns for Taint-Style Vulnerabilities. Fabian Yamaguchi, Alwin Maier, Hugo Gascon, Konrad Rieck |
| 2015 | Bitcoin over Tor isn't a Good Idea. Alex Biryukov, Ivan Pustogarov |
| 2015 | CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera |
| 2015 | Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. Beom Heyn Kim, David Lie |
| 2015 | Connection-Oriented DNS to Improve Privacy and Security. Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya |
| 2015 | Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. Yuanzhong Xu, Weidong Cui, Marcus Peinado |
| 2015 | Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz |
| 2015 | Cracking-Resistant Password Vaults Using Natural Language Encoders. Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart |
| 2015 | Cross-Architecture Bug Search in Binary Executables. Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz |
| 2015 | Effective Real-Time Android Application Auditing. Mingyuan Xia, Lu Gong, Yuanhao Lyu, Zhengwei Qi, Xue Liu |
| 2015 | Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting. Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich |
| 2015 | Forward Secure Asynchronous Messaging from Puncturable Encryption. Matthew D. Green, Ian Miers |
| 2015 | GenoGuard: Protecting Genomic Data against Brute-Force Attacks. Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels |
| 2015 | Geppetto: Versatile Verifiable Computation. Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur |
| 2015 | GraphSC: Parallel Secure Computation Made Easy. Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi |
| 2015 | High System-Code Security with Low Overhead. Jonas Wagner, Volodymyr Kuznetsov, George Candea, Johannes Kinder |
| 2015 | How Secure and Quick is QUIC? Provable Security and Performance Analyses. Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru |
| 2015 | Last-Level Cache Side-Channel Attacks are Practical. Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee |
| 2015 | Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. Nan Zhang, Kan Yuan, Muhammad Naveed, Xiao-yong Zhou, Xiaofeng Wang |
| 2015 | Malicious-Client Security in Blind Seer: A Scalable Private DBMS. Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin |
| 2015 | Micro-Policies: Formally Verified, Tag-Based Security Monitors. Arthur Azevedo de Amorim, Maxime Dénès, Nick Giannarakis, Catalin Hritcu, Benjamin C. Pierce, Antal Spector-Zabusky, Andrew Tolmach |
| 2015 | Missing the Point(er): On the Effectiveness of Code Pointer Integrity. Isaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard E. Shrobe, Stelios Sidiroglou-Douskos, Martin C. Rinard, Hamed Okhravi |
| 2015 | ObliVM: A Programming Framework for Secure Computation. Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi |
| 2015 | On Subnormal Floating Point and Abnormal Timing. Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham |
| 2015 | Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila |
| 2015 | Privacy and Access Control for Outsourced Personal Records. Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder |
| 2015 | Program-Adaptive Mutational Fuzzing. Sang Kil Cha, Maverick Woo, David Brumley |
| 2015 | Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang |
| 2015 | Readactor: Practical Code Randomization Resilient to Memory Disclosure. Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz |
| 2015 | Riposte: An Anonymous Messaging System Handling Millions of Users. Henry Corrigan-Gibbs, Dan Boneh, David Mazières |
| 2015 | S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar |
| 2015 | Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza |
| 2015 | Secure Track Verification. Matthias Schäfer, Vincent Lenders, Jens B. Schmitt |
| 2015 | Securing Multiparty Online Services Via Certification of Symbolic Transactions. Eric Yawei Chen, Shuo Chen, Shaz Qadeer, Rui Wang |
| 2015 | Security of the J-PAKE Password-Authenticated Key Exchange Protocol. Michel Abdalla, Fabrice Benhamouda, Philip MacKenzie |
| 2015 | SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions. David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi |
| 2015 | SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers. Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas |
| 2015 | SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten |
| 2015 | SoK: Secure Messaging. Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith |
| 2015 | SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser. John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Christopher J. Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal |
| 2015 | Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks. Ryan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson |
| 2015 | The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras |
| 2015 | The Miner's Dilemma. Ittay Eyal |
| 2015 | TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits. Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar |
| 2015 | Towards Making Systems Forget with Machine Unlearning. Yinzhi Cao, Junfeng Yang |
| 2015 | Understanding and Monitoring Embedded Web Scripts. Yuchen Zhou, David Evans |
| 2015 | Using Hardware Features for Increased Debugging Transparency. Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun |
| 2015 | VC3: Trustworthy Data Analytics in the Cloud Using SGX. Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich |
| 2015 | Vetting SSL Usage in Applications with SSLINT. Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang |
| 2015 | Virtual Proofs of Reality and their Physical Implementation. Ulrich Rührmair, J. L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson |
| 2015 | What the App is That? Deception and Countermeasures in the Android User Interface. Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna |