On the Mismanagement and Maliciousness of Networks
Jing Zhang, Zakir Durumeric, Michael Bailey, Manish Karir and Mingyan Liu
No Direction Home: The True Cost of Routing Around Decoys
Amir Houmansadr, Edmund L. Wong and Vitaly Shmatikov
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
Younghwan Go, EunYoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune and KyoungSoo Park
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers
Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero and Guofei Gu
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
Christian Rossow
ROPecker: A Generic and Practical Approach for Defending Against ROP Attacks
Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding and Robert H. Deng
A Trusted Safety Verifier for Process Controller Code
Stephen McLaughlin, Saman Zonouz, Devin Pohly and Patrick McDaniel
Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares
Jonas Zaddach, Luca Bruno, Aurelien Francillon and Davide Balzarotti
SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks
Dongseok Jang, Zachary Tatlock and Sorin Lerner
HYBRID-BRIDGE: Efficiently Bridging the Semantic Gap in Virtual Machine Introspection via Decoupled Execution and Training Memoization
Alireza Saberi, Yangchun Fu and Zhiqiang Lin
Screenmilker: How to Milk Your Android Screen for Secrets
Chia-Chi Lin, Hongyang Li, Xiaoyong Zhou and XiaoFeng Wang
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable
Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury and Srihari Nelakuditi
Smartphones as Practical and Secure Location Verification Tokens for Payments
Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen and Srdjan Capkun
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
Martin Georgiev, Suman Jana and Vitaly Shmatikov
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android
Muhammad Naveed, Xiaoyong Zhou, Soteris Demetriou, XiaoFeng Wang and Carl A Gunter
DSpin: Detecting Automatically Spun Content on the Web
Qing Zhang, David Y. Wang and Geoffrey M. Voelker
Toward Black-Box Detection of Logic Flaws in Web Applications
Giancarlo Pellegrino and Davide Balzarotti
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud
Arnar Birgisson, Joe Gibbs Politz, Ulfar Erlingsson, Ankur Taly, Michael Vrable and Mark Lentczner
Detecting Logic Vulnerabilities in E-Commerce Applications
Fangqi Sun, Liang Xu and Zhendong Su
Simulation of Built-in PHP Features for Precise Static Code Analysis
Johannes Dahse and Thorsten Holz
Enhanced Certificate Transparency and End-to-end Encrypted Mail
Mark D. Ryan
Privacy through Pseudonymity in Mobile Telephony Systems
Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter and Mark Ryan
Privacy-Preserving Distributed Stream Monitoring
Arik Friedman, Izchak Sharfman, Daniel Keren and Assaf Schuster
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
Rob Jansen, Florian Tschorsch, Aaron Johnson and Bjorn Scheuermann
Selling Off Privacy at Auction
Lukasz Olejnik, Minh-Dung Tran and Claude Castelluccia
The Tangled Web of Password Reuse
Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov and XiaoFeng Wang
On the Semantic Patterns of Passwords and their Security Impact
Rafael Veras, Christopher Collins and Julie Thorpe
From Very Weak to Very Strong: Analyzing Password-Strength Meters
Xavier de Carné de Carnavalet and Mohammad Mannan
Copker: Computing with Private Keys without RAM
Le Guan, Jingqiang Lin, Bo Luo and Jiwu Jing
Practical Dynamic Searchable Encryption with Small Leakage
Emil Stefanov, Charalampos Papamanthou and Elaine Shi
Decentralized Anonymous Credentials
Christina Garman, Matthew Green and Ian Miers
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Catalin Ros and Michael Steiner
Authentication Using Pulse-Response Biometrics
Kasper B. Rasmussen, Marc Roeschlin, Ivan Martinovic and Gene Tsudik
Hardening Persona – Improving Federated Web Login
Michael Dietz and Dan S. Wallach
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices
Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena and Naveen Nathan
Leveraging USB to Establish Host Identity Using Commodity Devices
Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd and Kevin R. B. Butler
PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces
Robert Templeman, Mohammed Korayem, David Crandall and Apu Kapadia
Auditable Version Control Systems
Bo Chen and Reza Curtmola
Power Attack: An Increasing Threat to Data Centers
Zhang Xu, Haining Wang, Zichen Xu and Xiaorui Wang
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist
Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi and Markus Jakobsson
Botcoin: Monetizing Stolen Cycles
Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren and Kirill Levchenko
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
Siegfried Rasthofer, Steven Arzt and Eric Bodden
AirBag: Boosting Smartphone Resistance to Malware Infection
Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang and Xuxian Jiang
SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps
David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin and Latifur Khan
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications
Mu Zhang and Heng Yin
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel and Giovanni Vigna
Nazca: Detecting Malware Distribution in Large-Scale Networks
Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee and Marco Mellia
Persistent Data-only Malware: Function Hooks without Code
Sebastian Vogl, Jonas Pfoh, Thomas Kittel and Claudia Eckert Technische Universitat Munchen
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon and Konrad Rieck
Gyrus: A Framework for User-Intent Monitoring of Text-Based Networked Applications
Yeongjin Jang, Simon P. Chung, Bryan D. Payne and Wenke Lee
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings
Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu and Rajesh Kana
Web PKI: Closing the Gap between Guidelines and Practices
Antoine Delignat-Lavaud, Mart ́ın Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber and Yinglian Xie
Efficient Private File Retrieval by Combining ORAM and PIR
Travis Mayberry, Erik-Oliver Blass and Agnes Hui Chan
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
Matthias Schulz, Adrian Loch and Matthias Hollick
Practical Issues with TLS Client Certificate Authentication
Arnis Parsovs
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks
Adam Bates, Kevin Butler, Andreas Haeberlen, Micah Sherr and Wenchao Zhou
Towards a Richer Set of Services in Software-Defined Networks
Roberto Bifulco and Ghassan Karame
A Tradeoff between Caching Efficiency and Data Protection for Video Services in CCN
Eunsang Cho, Jongho Shin, Jaeyoung Choi, Ted Taekyoung Kwon and Yanghee Choi
Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking
Cesar Ghali, Gene Tsudik and Ersin Uzun
Cellpot: A Concept for Next Generation Cellular Network Honeypots
Ravishankar Borgaonkar, Steffen Liebergeld and Matthias Lange
Zero-Communication Seed Establishment for Anti-Jamming Techniques
Kim Pecina, Esfandiar Mohammadi and Christina Popper
Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP be Secured with BGPsec?
Qi Li, Yih-Chun Hu and Xinwen Zhang
Communication Pattern Monitoring: Improving the Utility of Anomaly Detection for Industrial Control Systems
Man-Ki Yoon and Gabriela Ciocarlie
Should I Protect You? Understanding Developers’ Behavior to Privacy-Preserving APIs
Shubham Jain and Janne Lindqvist
The Privacy and Security Behaviors of Smartphone App Developers
Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong and Lorrie Faith Cranor
Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy
Rebecca Balebako, Rich Shay and Lorrie Faith Cranor
Learning from “Shadow Security”: Why understanding non-compliance provides the basis for effective security
Iacovos Kirlappos, Simon Parkin and Angela Sasse
A Comparative Usability Study of Two-Factor Authentication
Emiliano De Cristofaro, Honglu Du, Julien Freudiger and Greg Norcie
Beyond Access Control: Managing Online Privacy via Exposure
Mainack Mondal, Peter Druschel, Krishna P. Gummadi and Alan Mislove
Spiny CACTOS: OSN users attitudes and perceptions towards cryptographic access control tools
Ero Balsa, Laura Brandimarte, Alessandro Acquisti, Claudia Diaz and Seda Gürses
Dynamic Cognitive Game CAPTCHA Usability and Detection of Streaming-Enabled Farming
Manar Mohamed, Song Gao, Nitesh Saxena and Chengcui Zhang
A Field Study of Run-Time Location Access Disclosures on Android Smartphones
Huiqing Fu, Yulong Yang, Nileema Shingte, Janne Lindqvist and Marco Gruteser
Survey on the Fate of Digital Footprints after Death
Carsten Grimm and Sonia Chiasson
An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing
Emiliano De Cristofaro
On a Scale from 1 to 10, How Private Are You? Scoring Facebook Privacy Settings
Tehila Minkus and Nasir Memon
Why Johnny Can’t Blow The Whistle: Identifying and Reducing Usability Issues in Anonymity Systems
Greg Norcie, Jim Blythe, Kelly Caine and L Jean Camp
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote
Jurlind Budurushi, Marcel Woide and Melanie Volkamer
Voter, What Message Will Motivate You To Verify Your Vote?
M. Maina Olembo, Karen Renaud, Steffen Bartsch and Melanie Volkamer