Plain-Text Recovery Attacks Against Datagram TLS
Kenneth Paterson and Nadhem Alfardan
ANDaNA: Anonymous Named Data Networking Application
Steven Dibenedetto, Paolo Gasti, Gene Tsudik and Ersin Uzun
Persistent OSPF Attacks
Gabi Nakibly, Alex Kirshon, Dima Gonikman and Dan Boneh
You are what you like! Information leakage through users’ Interests
Abdelberi Chaabane, Gergely Acs and Mohamed Ali Kaafar
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks
Prateek Mittal, Matthew Caesar and Nikita Borisov
Towards Online Spam Filtering in Social Networks
Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary
Location leaks over the GSM air interface
Denis Foo Kune, John Koelndorfer, Nicholas Hopper and Yongdae Kim
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks
Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi and Jean-Pierre Hubaux
You Can Run, but You Can’t Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks
Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Z. Morley Mao, Ming Zhang and Yi-Min Wang
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications
Nico Golde, Kévin Redon and Ravishankar Borgaonkar
Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud
Yanbin Lu
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds
Yangyi Chen, Bo Peng, Xiaofeng Wang and Haixu Tang
Making argument systems for outsourced computation practical (sometimes)
Srinath Setty, Richard Mcpherson, Andrew Blumberg and Michael Walfish
Towards Practical Oblivious RAM
Emil Stefanov, Elaine Shi and Dawn Song
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation
Lok Yan, Manjukumar Jayachandra, Mu Zhang and Heng Yin
FreeMarket: Shopping for free in Android applications
Daniel Reynaud, Dawn Song, Tom Magrino, Edward Wu and Richard Shin
Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers, Kasper Bonne Rasmussen and Srdjan Capkun
Throttling Tor Bandwidth Parasites
Rob Jansen, Nicholas Hopper and Paul Syverson
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous
Maxfield Schuchard, Christopher Thompson, Nicholas Hopper and Yongdae Kim
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems
Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru and Radu State
Charm: A Framework for Rapidly Prototyping Cryptosystems
Joseph A. Akinyele, Matthew D. Green and Aviel D. Rubin
Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website
Yu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy and Brian Palmer
Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation
Mohammad Islam, Mehmet Kuzu and Murat Kantarcioglu
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability
Qiang Yan, Jin Han, Yingjiu Li and Robert H. Deng
Adaptive Password-Strength Meters from Markov Models
Claude Castelluccia, Markus Duermuth and Daniele Perito
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Yan Huang, David Evans and Jonathan Katz
Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications
Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber and Edgar Weippl
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger and Ahmad-Reza Sadeghi
Towards Taming Privilege-Escalation Attacks on Android
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi and Bhargava Shastry
Systematic Detection of Capability Leaks in Stock Android Smartphones
Michael Grace, Yajin Zhou, Zhi Wang and Xuxian Jiang
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
Yajin Zhou, Zhi Wang, Wu Zhou and Xuxian Jiang
Insights into User Behavior in Dealing with Internet Attacks
Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda and Davide Balzarotti
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks
Yinzhi Cao, Vinod Yegneswaran, Phillip Porras and Yan Chen
The Latent Community Model for Detecting Sybils in Social Networks
Zhuhua Cai and Christopher Jermaine
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation
Man Ho Au, Apu Kapadia and Willy Susilo
Accountable Wiretapping -or- I know they can hear you now
Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor and Dan Wallach
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
Rob Jansen and Nicholas Hopper
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence
Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang and Dongyan Xu
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust
Karim Eldefrawy, Gene Tsudik, Aurélien Francillon and Daniele Perito
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring
Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu and Changzhen Hu
WarningBird: Detecting Suspicious URLs in Twitter Stream
Sangho Lee and Jong Kim
Using replicated execution for a more secure and reliable web browser
Hui Xue, Nathan Dautenhahn and Samuel King
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications
Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu and Martin Abadi
Chrome Extensions: Threat Analysis and Countermeasures
Lei Liu, Xinwen Zhang, Guanhua Yan and Songqing Chen
Ghost Domain Names: Revoked Yet Still Resolvable
Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Haixin Duan and Jianping Wu
ShortMAC: Efficient Data-Plane Fault Localization
Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig and Patrick Tague
Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems
Jignesh Patel, Alex Liu and Eric Torng
The Case for Prefetching and Prevalidating TLS Server Certificates
Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson and Dan Boneh
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems
Hyojeong Lee, Jeff Seibert, Charles Killian and Cristina Nita-Rotaru
Automated Synthesis of Secure Distributed Applications
Michael Backes, Matteo Maffei and Kim Pecina
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware
Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August and Angelos D. Keromytis
Static detection of C++ vtable escape vulnerabilities in binary code
David Dewey and Jon Giffin
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis
Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang and Heng Yin