Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity
|
New York University
|
Practical Evasion of a Learning-Based Classifier: A Case Study
|
University of Tuebingen
|
Secure Multiparty Computations on Bitcoin
|
University of Warsaw
|
Automating Efficient RAM-Model Secure Computation
|
University of Maryland
|
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
|
Suman Jana
,
University of Texas at Austin
|
Stopping a Rapid Tornado with a Puff
|
Universidade de Lisboa
|
Framing Signals — A Return to Portable Shellcode
|
Herbert Bos
,
Erik Bosman
,
Vrije Universiteit Amsterdam
|
SoK: Automated Software Diversity
|
Andrei Homescu
,
Per Larsen
,
Stefan Brunthaler
,
Michael Franz
,
UC Irvine
|
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
|
Antoine Delignat-Lavaud
,
Karthikeyan Bhargavan
,
INRIA Paris-Rocquencourt
|
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API
|
Yuan Tian
,
Patrick Tague
,
Collin Jackson
,
Carnegie Mellon University
|
Quantifying Information Flow for Dynamic Secrets
|
University of Maryland
|
Blind Seer: A Scalable Private DBMS
|
Columbia University
|
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations
|
Nan Zhang
,
School of Informatics and Computing, Indiana University, Bloomington
|
Hacking Blind
|
Dan Boneh
|
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
|
University of Trier
|
Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains
|
Microsoft Research
|
Anonize: A Large-Scale Anonymous Survey System
|
Johns Hopkins University
|
Bootstrapping Privacy Compliance in Big Data Systems
|
Carnegie Mellon University
|
ZEBRA: Zero-Effort Bilateral Recurring Authentication
|
Dartmouth College
|
Wysteria: A Programming Language for Generic, Mixed-mode Multiparty Computations
|
University of Maryland
|
Doppelgänger Finder: Taking Stylometry To The Underground
|
UC Berkeley
|
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities
|
Sangho Lee
,
POSTECH
|
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections
|
RSA Laboratories
|
Out Of Control: Overcoming Control-Flow Integrity
|
Vrije Universiteit Amsterdam
|
When HTTPS Meets CDN: A Case of Authentication in Delegated Service
|
Department of Computer Science and Technology, Tsinghua University
|
From Zygote to Morula: Fortifying Weakened ASLR on Android
|
Byoungyoung Lee
,
Georgia Institute of Technology
|
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O
|
Carnegie Mellon University
|
Automated Analysis of Security Protocols with Global State
|
INRIA Nancy
|
Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating
|
Luyi Xing
,
Indiana University Bloomington
|
A Study of Probabilistic Password Models
|
Purdue University
|
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels
|
University of Illinois at Urbana-Champaign
|
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces
|
Collin Mulliner
,
William Robertson
,
Engin Kirda
,
Northeastern University
|
PermaCoin: Repurposing Bitcoin Work for Data Preservation
|
University of Maryland
|
Zerocash: Decentralized Anonymous Payments from Bitcoin
|
Technion
|
Automating Isolation and Least Privilege in Web Services
|
Princeton University
|
Analyzing Forged SSL Certificates in the Wild
|
Carnegie Mellon University
|
Chip and Skim: Cloning EMV Cards with the Pre-Play Attack
|
Ross Anderson
,
Sergei Skorobogatov
,
University of Cambridge
|
Modeling and Discovering Vulnerabilities with Code Property Graphs
|
Fabian Yamaguchi
,
University of Goettingen
|
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
|
Thomas Ristenpart
,
Robert Jellinek
,
University of Wisconsin
|
Automated Verification of Group Key Agreement Protocols
|
IMDEA Software Institute
|
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System
|
University of Trier
|
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks
|
Michael Rushanan
,
Johns Hopkins University
|
SoK: Introspections on Trust and the Semantic Gap
|
Stony Brook
|
Dynamic Searchable Encryption via Blind Storage
|
University of Illinois at Urbana-Champaign
|