Accepted Papers

Accepted Papers

Note: Papers are presented in the order that they were submitted.

Jun Furukawa.
Request-Based Comparable Encryption

 

Ivan Damgaard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl and Nigel Smart
Practical Covertly Secure MPC for Dishonest Majority — or: Breaking the SPDZ Limits

 

Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas and Angelos Keromytis.
CellFlood: Attacking Tor Onion Routers on the Cheap

 

Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena and Dawn Song.
Data-confined HTML5 Applications

 

Symbolic Probabilistic Analysis of Off-line Guessing

 

Amir Herzberg and Haya Shulman.
Vulnerable Delegation of DNS Resolution

 

Ballot secrecy and ballot independence coincide

 

Arjan Jeckmans, Andreas Peter and Pieter Hartel.
Efficient Privacy-Enhanced Familiarity-Based Recommender System

 

Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li and Manos Antonakakis.
Measuring and Detecting Malware Downloads in Live Network Traffic

 

Dvir Schirman, Yossef Oren and Avishai Wool.
Range Extension Attacks on Contactless Smart cards

 

Jinpeng Wei, Feng Zhu and Calton Pu. KQguard:
Binary-Centric Defense against Kernel Queue Injection Attacks

 

Zhui Deng, Xiangyu Zhang and Dongyan Xu.
BISTRO: Binary Component Extraction and Embedding for Software Security Applications

 

Jun Dai, Xiaoyan Sun and Peng Liu.
Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies

 

Jan Camenisch, Robert R. Enderlein and Victor Shoup.
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$

 

Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode

 

Jonathan Crussell, Clint Gibler and Hao Chen.
Scalable Semantics-Based Detection of Similar Android Applications

 

Jin Li, Xiaofeng Chen, Jianfeng Ma and Wenjing Lou.
Fine-Grained Access Control System based on Outsourced Attribute-based Encryption

 

Nowhere to Hide: Navigating around Privacy in Online Social Networks

 

Shane Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu and Wenyuan Xu.
Current Events: Identifying Webpages by Tapping the Electrical Outlet

 

Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering and Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

 

Mining malware specifications through static reachability analysis

 

Martin Gagne, Pascal Lafourcade and Yassine Lakhnech.
Automated Security Proofs for Almost-Universal Hash for MAC verification

 

Andreas Griesmayer and Charles Morisset.
Automated Certification of Authorisation Policy Resistance

 

Bounded Memory Protocols and Progressing Collaborative Systems

 

Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe and Reginald L. Lagendijk.
Privacy-Preserving User Data Oriented Services For Groups With Dynamic Participation

 

Yossi Gilad and Amir Herzberg.
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI

 

Formal Approach for Route Agility Against Persistent Attackers

 

Youngja Park, Christopher Gates and Stephen Gates.
Estimating Asset Sensitivity by Profiling Users

 

Lei Wei and Mike Reiter.
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud

 

Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto and Yutaka Miyake.
Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract)

 

Michael Carl Tschantz, Anupam Datta and Jeannette M. Wing.
Purpose Restrictions on Information Use

 

Election Verifiability or Ballot Privacy: Do We Need to Choose?

 

Mishari Almishari, Paolo Gasti, Ekin Oguz and Gene Tsudik.
Privacy-Preserving Matching of Community-Contributed Content

 

Xinshu Dong, Hong Hu, Prateek Saxena and Zhenkai Liang.
A Quantitative Evaluation of Privilege Separation in Web Browser Designs

 

Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant and Dawn Song.
HI-CFG: Construction by Dynamic Binary Analysis, and Application to Attack Polymorphism

 

Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags and Rainer Böhme.
Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats

 

A Cryptographic Analysis of OPACITY

 

Giorgia Azzurra Marson and Bertram Poettering.
Practical Secure Logging: Seekable Sequential Key Generators

 

Michael Backes, Dario Fiore and Esfandiar Mohammadi.
Privacy-Preserving Accountable Computation

 

Steve Kremer, Robert Künnemann and Graham Steel.
Universally Composable Key-Management

 

Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati. Distributed Shuffling for Preserving Access Confidentiality

 

Deian Stefan, Pablo Buiras, Edward Yang, Amit Levy, David Terei, Alejandro Russo and David Mazieres. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling

 

Naipeng Dong, Hugo Jonker and Jun Pang.
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Scroll to Top