IEEE Symposium on Security and Privacy A*

56 papers

YearTitle / Authors
20152015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015
2015A Generic Approach to Automatic Deobfuscation of Executable Code.
Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray
2015A Messy State of the Union: Taming the Composite State Machines of TLS.
Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue
2015ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.
Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk
2015Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab
2015Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.
Fabian Yamaguchi, Alwin Maier, Hugo Gascon, Konrad Rieck
2015Bitcoin over Tor isn't a Good Idea.
Alex Biryukov, Ivan Pustogarov
2015CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera
2015Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices.
Beom Heyn Kim, David Lie
2015Connection-Oriented DNS to Improve Privacy and Security.
Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
2015Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems.
Yuanzhong Xu, Weidong Cui, Marcus Peinado
2015Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
2015Cracking-Resistant Password Vaults Using Natural Language Encoders.
Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
2015Cross-Architecture Bug Search in Binary Executables.
Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
2015Effective Real-Time Android Application Auditing.
Mingyuan Xia, Lu Gong, Yuanhao Lyu, Zhengwei Qi, Xue Liu
2015Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting.
Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich
2015Forward Secure Asynchronous Messaging from Puncturable Encryption.
Matthew D. Green, Ian Miers
2015GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels
2015Geppetto: Versatile Verifiable Computation.
Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
2015GraphSC: Parallel Secure Computation Made Easy.
Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi
2015High System-Code Security with Low Overhead.
Jonas Wagner, Volodymyr Kuznetsov, George Candea, Johannes Kinder
2015How Secure and Quick is QUIC? Provable Security and Performance Analyses.
Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru
2015Last-Level Cache Side-Channel Attacks are Practical.
Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee
2015Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
Nan Zhang, Kan Yuan, Muhammad Naveed, Xiao-yong Zhou, Xiaofeng Wang
2015Malicious-Client Security in Blind Seer: A Scalable Private DBMS.
Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2015Micro-Policies: Formally Verified, Tag-Based Security Monitors.
Arthur Azevedo de Amorim, Maxime Dénès, Nick Giannarakis, Catalin Hritcu, Benjamin C. Pierce, Antal Spector-Zabusky, Andrew Tolmach
2015Missing the Point(er): On the Effectiveness of Code Pointer Integrity.
Isaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard E. Shrobe, Stelios Sidiroglou-Douskos, Martin C. Rinard, Hamed Okhravi
2015ObliVM: A Programming Framework for Secure Computation.
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi
2015On Subnormal Floating Point and Abnormal Timing.
Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham
2015Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.
Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
2015Privacy and Access Control for Outsourced Personal Records.
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2015Program-Adaptive Mutational Fuzzing.
Sang Kil Cha, Maverick Woo, David Brumley
2015Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang
2015Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
2015Riposte: An Anonymous Messaging System Handling Millions of Users.
Henry Corrigan-Gibbs, Dan Boneh, David Mazières
2015S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar
2015Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.
Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza
2015Secure Track Verification.
Matthias Schäfer, Vincent Lenders, Jens B. Schmitt
2015Securing Multiparty Online Services Via Certification of Symbolic Transactions.
Eric Yawei Chen, Shuo Chen, Shaz Qadeer, Rui Wang
2015Security of the J-PAKE Password-Authenticated Key Exchange Protocol.
Michel Abdalla, Fabrice Benhamouda, Philip MacKenzie
2015SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions.
David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
2015SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas
2015SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015SoK: Secure Messaging.
Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith
2015SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Christopher J. Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal
2015Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.
Ryan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson
2015The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras
2015The Miner's Dilemma.
Ittay Eyal
2015TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
2015Towards Making Systems Forget with Machine Unlearning.
Yinzhi Cao, Junfeng Yang
2015Understanding and Monitoring Embedded Web Scripts.
Yuchen Zhou, David Evans
2015Using Hardware Features for Increased Debugging Transparency.
Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun
2015VC3: Trustworthy Data Analytics in the Cloud Using SGX.
Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich
2015Vetting SSL Usage in Applications with SSLINT.
Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang
2015Virtual Proofs of Reality and their Physical Implementation.
Ulrich Rührmair, J. L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson
2015What the App is That? Deception and Countermeasures in the Android User Interface.
Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna