Star 0


Title Humans
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity New York University
Practical Evasion of a Learning-Based Classifier: A Case Study University of Tuebingen
Secure Multiparty Computations on Bitcoin University of Warsaw
Automating Efficient RAM-Model Secure Computation University of Maryland
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations Suman Jana , University of Texas at Austin
Stopping a Rapid Tornado with a Puff Universidade de Lisboa
Framing Signals — A Return to Portable Shellcode Herbert Bos , Erik Bosman , Vrije Universiteit Amsterdam
SoK: Automated Software Diversity Andrei Homescu , Per Larsen , Stefan Brunthaler , Michael Franz , UC Irvine
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Antoine Delignat-Lavaud , Karthikeyan Bhargavan , INRIA Paris-Rocquencourt
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian , Patrick Tague , Collin Jackson , Carnegie Mellon University
Quantifying Information Flow for Dynamic Secrets University of Maryland
Blind Seer: A Scalable Private DBMS Columbia University
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations Nan Zhang , School of Informatics and Computing, Indiana University, Bloomington
Hacking Blind Dan Boneh
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking University of Trier
Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains Microsoft Research
Anonize: A Large-Scale Anonymous Survey System Johns Hopkins University
Bootstrapping Privacy Compliance in Big Data Systems Carnegie Mellon University
ZEBRA: Zero-Effort Bilateral Recurring Authentication Dartmouth College
Wysteria: A Programming Language for Generic, Mixed-mode Multiparty Computations University of Maryland
Doppelgänger Finder: Taking Stylometry To The Underground UC Berkeley
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities Sangho Lee , POSTECH
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections RSA Laboratories
Out Of Control: Overcoming Control-Flow Integrity Vrije Universiteit Amsterdam
When HTTPS Meets CDN: A Case of Authentication in Delegated Service Department of Computer Science and Technology, Tsinghua University
From Zygote to Morula: Fortifying Weakened ASLR on Android Byoungyoung Lee , Georgia Institute of Technology
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O Carnegie Mellon University
Automated Analysis of Security Protocols with Global State INRIA Nancy
Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating Luyi Xing , Indiana University Bloomington
A Study of Probabilistic Password Models Purdue University
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels University of Illinois at Urbana-Champaign
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner , William Robertson , Engin Kirda , Northeastern University
PermaCoin: Repurposing Bitcoin Work for Data Preservation University of Maryland
Zerocash: Decentralized Anonymous Payments from Bitcoin Technion
Automating Isolation and Least Privilege in Web Services Princeton University
Analyzing Forged SSL Certificates in the Wild Carnegie Mellon University
Chip and Skim: Cloning EMV Cards with the Pre-Play Attack Ross Anderson , Sergei Skorobogatov , University of Cambridge
Modeling and Discovering Vulnerabilities with Code Property Graphs Fabian Yamaguchi , University of Goettingen
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG Thomas Ristenpart , Robert Jellinek , University of Wisconsin
Automated Verification of Group Key Agreement Protocols IMDEA Software Institute
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System University of Trier
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks Michael Rushanan , Johns Hopkins University
SoK: Introspections on Trust and the Semantic Gap Stony Brook
Dynamic Searchable Encryption via Blind Storage University of Illinois at Urbana-Champaign