Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components
|
|
Private-by-Design Advertising Meets the Real World
|
|
Face in the Distorting Mirror: Revisiting Photo-based Social Authentication
|
Federico Maggi
,
Stefano Zanero
,
Iasonas Polakis
|
AutoProbe: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis
|
Zhaoyan Xu
|
Security Vulnerability in Processor-Interconnect Router Design
|
|
PoliCert: Secure and Flexible TLS Certificate Management
|
|
Multi-ciphersuite security of the Secure Shell (SSH) protocol
|
|
A New Additive Homomorphic Encryption based on the co-ACD Problem
|
|
Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
|
|
Oblivious Data Structure
|
|
Securing SSL Certificate Verification through Dynamic Linking
|
|
ARPKI: Attack Resilient Public-Key Infrastructure
|
|
Founding Digital Currency on Secure Computation
|
|
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound
|
Zhe Zhou
,
Xiangyu Liu
|
Verifying Curve25519 Software
|
|
Routing Bottlenecks in the Internet – Causes, Exploits, and Countermeasures
|
|
TUTORIAL 1
|
|
A11y Attacks: Exploiting Accessibility in Operating Systems
|
Wenke Lee
,
Yeongjin Jang
,
Tielei Wang
,
Simon Chung
,
Chengyu Song
|
Characterizing Large-Scale Click Fraud in ZeroAccess
|
Kirill Levchenko
,
Stefan Savage
,
Damon McCoy
|
Rosemary: A Robust, Secure, and High-performance Network Operating System
|
Sangho Lee
,
Seungwon Shin
|
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions
|
|
Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code
|
|
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation
|
Xing Jin
|
Code Reuse Attacks in PHP: Automated POP Chain Generation
|
Thorsten Holz
|
VoIP Fraud: Identifying a Wolf in Sheep's Clothing
|
|
A Critical Evaluation of Website Fingerprinting Attacks
|
Rachel Greenstadt
,
Gunes Acar
|
Context-free Attacks Using Keyboard Acoustic Emanations
|
|
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
|
|
Mechanized Network Origin and Path Authenticity Proofs
|
|
Deanonymisation of clients in Bitcoin P2P network
|
|
Location Privacy Protection for Smartphone Users
|
|
Your Online Interests – Pwned! A Pollution Attack Against Targeted Advertising
|
Xinyu Xing
,
Wenke Lee
|
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
|
|
Consequences of Connectivity: Characterizing Account Hijacking on Twitter
|
Frank Li
|
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
|
|
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption
|
|
Searchable Encryption with Secure and Efficient Updates
|
|
Toward Robust Hidden Volumes using Write-Only Oblivious RAM
|
Guevara Noubir
|
Dialing Back Abuse on Phone Veri?ed Accounts
|
Elie Bursztein
,
Damon McCoy
|
SCORAM: Oblivious RAM for Secure Computation
|
|
How to Use BItcoin to Incentivize Correct Computations
|
|
DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans
|
|
Optimal Geo-Indistinguishable Mechanisms for Location Privacy
|
|