Accepted Papers
Note: Papers are presented in the order that they were submitted.
Request-Based Comparable Encryption
Practical Covertly Secure MPC for Dishonest Majority — or: Breaking the SPDZ Limits
CellFlood: Attacking Tor Onion Routers on the Cheap
Data-confined HTML5 Applications
Symbolic Probabilistic Analysis of Off-line Guessing
Vulnerable Delegation of DNS Resolution
Ballot secrecy and ballot independence coincide
Efficient Privacy-Enhanced Familiarity-Based Recommender System
Measuring and Detecting Malware Downloads in Live Network Traffic
Range Extension Attacks on Contactless Smart cards
KQguard:
Binary-Centric Defense against Kernel Queue Injection Attacks
BISTRO: Binary Component Extraction and Embedding for Software Security Applications
Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode
Scalable Semantics-Based Detection of Similar Android Applications
Fine-Grained Access Control System based on Outsourced Attribute-based Encryption
Nowhere to Hide: Navigating around Privacy in Online Social Networks
Current Events: Identifying Webpages by Tapping the Electrical Outlet
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Mining malware specifications through static reachability analysis
Automated Security Proofs for Almost-Universal Hash for MAC verification
Automated Certification of Authorisation Policy Resistance
Bounded Memory Protocols and Progressing Collaborative Systems
Privacy-Preserving User Data Oriented Services For Groups With Dynamic Participation
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
Formal Approach for Route Agility Against Persistent Attackers
Estimating Asset Sensitivity by Profiling Users
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud
Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract)
Purpose Restrictions on Information Use
Election Verifiability or Ballot Privacy: Do We Need to Choose?
Privacy-Preserving Matching of Community-Contributed Content
A Quantitative Evaluation of Privilege Separation in Web Browser Designs
HI-CFG: Construction by Dynamic Binary Analysis, and Application to Attack Polymorphism
Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats
A Cryptographic Analysis of OPACITY
Practical Secure Logging: Seekable Sequential Key Generators
Privacy-Preserving Accountable Computation
Universally Composable Key-Management
Distributed Shuffling for Preserving Access Confidentiality
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations