Star 0


Title Humans
Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components
Private-by-Design Advertising Meets the Real World
Face in the Distorting Mirror: Revisiting Photo-based Social Authentication Federico Maggi , Stefano Zanero , Iasonas Polakis
AutoProbe: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu
Security Vulnerability in Processor-Interconnect Router Design
PoliCert: Secure and Flexible TLS Certificate Management
Multi-ciphersuite security of the Secure Shell (SSH) protocol
A New Additive Homomorphic Encryption based on the co-ACD Problem
Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
Oblivious Data Structure
Securing SSL Certificate Verification through Dynamic Linking
ARPKI: Attack Resilient Public-Key Infrastructure
Founding Digital Currency on Secure Computation
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound Zhe Zhou , Xiangyu Liu
Verifying Curve25519 Software
Routing Bottlenecks in the Internet – Causes, Exploits, and Countermeasures
A11y Attacks: Exploiting Accessibility in Operating Systems Wenke Lee , Yeongjin Jang , Tielei Wang , Simon Chung , Chengyu Song
Characterizing Large-Scale Click Fraud in ZeroAccess Kirill Levchenko , Stefan Savage , Damon McCoy
Rosemary: A Robust, Secure, and High-performance Network Operating System Sangho Lee , Seungwon Shin
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions
Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation Xing Jin
Code Reuse Attacks in PHP: Automated POP Chain Generation Thorsten Holz
VoIP Fraud: Identifying a Wolf in Sheep's Clothing
A Critical Evaluation of Website Fingerprinting Attacks Rachel Greenstadt , Gunes Acar
Context-free Attacks Using Keyboard Acoustic Emanations
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
Mechanized Network Origin and Path Authenticity Proofs
Deanonymisation of clients in Bitcoin P2P network
Location Privacy Protection for Smartphone Users
Your Online Interests – Pwned! A Pollution Attack Against Targeted Advertising Xinyu Xing , Wenke Lee
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
Consequences of Connectivity: Characterizing Account Hijacking on Twitter Frank Li
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption
Searchable Encryption with Secure and Efficient Updates
Toward Robust Hidden Volumes using Write-Only Oblivious RAM Guevara Noubir
Dialing Back Abuse on Phone Veri?ed Accounts Elie Bursztein , Damon McCoy
SCORAM: Oblivious RAM for Secure Computation
How to Use BItcoin to Incentivize Correct Computations
DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans
Optimal Geo-Indistinguishable Mechanisms for Location Privacy