Accepted Papers

Accepted Papers

Note: Papers are presented in the order that they were submitted.

Jun Furukawa.
Request-Based Comparable Encryption


Ivan Damgaard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl and Nigel Smart
Practical Covertly Secure MPC for Dishonest Majority — or: Breaking the SPDZ Limits


Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas and Angelos Keromytis.
CellFlood: Attacking Tor Onion Routers on the Cheap


Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena and Dawn Song.
Data-confined HTML5 Applications


Symbolic Probabilistic Analysis of Off-line Guessing


Amir Herzberg and Haya Shulman.
Vulnerable Delegation of DNS Resolution


Ballot secrecy and ballot independence coincide


Arjan Jeckmans, Andreas Peter and Pieter Hartel.
Efficient Privacy-Enhanced Familiarity-Based Recommender System


Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li and Manos Antonakakis.
Measuring and Detecting Malware Downloads in Live Network Traffic


Dvir Schirman, Yossef Oren and Avishai Wool.
Range Extension Attacks on Contactless Smart cards


Jinpeng Wei, Feng Zhu and Calton Pu. KQguard:
Binary-Centric Defense against Kernel Queue Injection Attacks


Zhui Deng, Xiangyu Zhang and Dongyan Xu.
BISTRO: Binary Component Extraction and Embedding for Software Security Applications


Jun Dai, Xiaoyan Sun and Peng Liu.
Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies


Jan Camenisch, Robert R. Enderlein and Victor Shoup.
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$


Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode


Jonathan Crussell, Clint Gibler and Hao Chen.
Scalable Semantics-Based Detection of Similar Android Applications


Jin Li, Xiaofeng Chen, Jianfeng Ma and Wenjing Lou.
Fine-Grained Access Control System based on Outsourced Attribute-based Encryption


Nowhere to Hide: Navigating around Privacy in Online Social Networks


Shane Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu and Wenyuan Xu.
Current Events: Identifying Webpages by Tapping the Electrical Outlet


Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering and Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems


Mining malware specifications through static reachability analysis


Martin Gagne, Pascal Lafourcade and Yassine Lakhnech.
Automated Security Proofs for Almost-Universal Hash for MAC verification


Andreas Griesmayer and Charles Morisset.
Automated Certification of Authorisation Policy Resistance


Bounded Memory Protocols and Progressing Collaborative Systems


Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe and Reginald L. Lagendijk.
Privacy-Preserving User Data Oriented Services For Groups With Dynamic Participation


Yossi Gilad and Amir Herzberg.
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI


Formal Approach for Route Agility Against Persistent Attackers


Youngja Park, Christopher Gates and Stephen Gates.
Estimating Asset Sensitivity by Profiling Users


Lei Wei and Mike Reiter.
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud


Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto and Yutaka Miyake.
Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract)


Michael Carl Tschantz, Anupam Datta and Jeannette M. Wing.
Purpose Restrictions on Information Use


Election Verifiability or Ballot Privacy: Do We Need to Choose?


Mishari Almishari, Paolo Gasti, Ekin Oguz and Gene Tsudik.
Privacy-Preserving Matching of Community-Contributed Content


Xinshu Dong, Hong Hu, Prateek Saxena and Zhenkai Liang.
A Quantitative Evaluation of Privilege Separation in Web Browser Designs


Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant and Dawn Song.
HI-CFG: Construction by Dynamic Binary Analysis, and Application to Attack Polymorphism


Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags and Rainer Böhme.
Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats


A Cryptographic Analysis of OPACITY


Giorgia Azzurra Marson and Bertram Poettering.
Practical Secure Logging: Seekable Sequential Key Generators


Michael Backes, Dario Fiore and Esfandiar Mohammadi.
Privacy-Preserving Accountable Computation


Steve Kremer, Robert Künnemann and Graham Steel.
Universally Composable Key-Management


Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati. Distributed Shuffling for Preserving Access Confidentiality


Deian Stefan, Pablo Buiras, Edward Yang, Amit Levy, David Terei, Alejandro Russo and David Mazieres. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling


Naipeng Dong, Hugo Jonker and Jun Pang.
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Scroll to Top