


default search action
37th SP 2016: San Jose, CA, USA
- IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0824-7

Hardware and Private Execution
- Chengyu Song

, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee
, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. 1-17 - Kaiyuan Yang

, Matthew Hicks, Qing Dong, Todd M. Austin, Dennis Sylvester:
A2: Analog Malicious Hardware. 18-37 - Roberto Guanciale

, Hamed Nemati
, Christoph Baumann, Mads Dam:
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures. 38-55 - Yaohui Chen, Sebassujeen Reymondjohnson, Zhichuang Sun, Long Lu:

Shreds: Fine-Grained Execution Units with Private Memory. 56-71 - Ning Zhang, Kun Sun

, Wenjing Lou, Yiwei Thomas Hou
:
CaSE: Cache-Assisted Secure Execution on ARM Processors. 72-90
Analyze Me
- George Argyros, Ioannis Stais

, Aggelos Kiayias, Angelos D. Keromytis:
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters. 91-109 - Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti

, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. 110-121 - Lucas Silva Figueiredo

, Benjamin Livshits, David Molnar, Margus Veanes:
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming. 122-137 - Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Krügel, Giovanni Vigna:

SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. 138-157 - Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith

:
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study. 158-177
Oblivious and Snarky
- Daniel S. Roche

, Adam J. Aviv
, Seung Geol Choi:
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence. 178-197 - Cetin Sahin, Victor Zakhary, Amr El Abbadi, Huijia Lin, Stefano Tessaro:

TaoStore: Overcoming Asynchronicity in Oblivious Data Storage. 198-217 - Samee Zahur, Xiao Wang

, Mariana Raykova, Adrià Gascón, Jack Doerner, David Evans
, Jonathan Katz:
Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation. 218-234 - Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss

, Bryan Parno:
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation. 235-254
Call Me on Usable Security
- Elissa M. Redmiles, Amelia R. Malone, Michelle L. Mazurek:

I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security. 272-288 - Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim

, Michelle L. Mazurek, Christian Stransky:
You Get Where You're Looking for: The Impact of Information Sources on Code Security. 289-305 - Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, Michael D. Bailey:

Users Really Do Plug in USB Drives They Find. 306-319 - Huahong Tu

, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. 320-338 - Bradley Reaves, Nolen Scaife

, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler
:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. 339-356
Phoning it in
- Kai Chen, Xueqiang Wang

, Yi Chen, Peng Wang, Yeonjoon Lee
, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou:
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS. 357-376 - Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:

TriggerScope: Towards Detecting Logic Bombs in Android Applications. 377-396 - Sashank Narain, Triet D. Vo-Huu, Kenneth Block, Guevara Noubir:

Inferring User Routes and Locations Using Zero-Permission Mobile Sensors. 397-413 - Wenrui Diao

, Xiangyu Liu, Zhou Li
, Kehuan Zhang:
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. 414-432 - Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith

:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. 433-451
Key Exchange and Certificates
- Marc Fischlin, Felix Günther, Benedikt Schmidt, Bogdan Warinschi:

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3. 452-469 - Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe:

Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication. 470-485 - Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu:

Multiple Handshakes Security of TLS 1.3 Candidates. 486-505 - Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss

, Santiago Zanella-Béguelin
:
Downgrade Resilience in Key-Exchange Protocols. 506-525 - Ewa Syta

, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Philipp Jovanovic, Linus Gasser
, Nicolas Gailly, Ismail Khoffi, Bryan Ford
:
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning. 526-545
Learning about Privacy
- Vincent Bindschaedler

, Reza Shokri
:
Synthesizing Plausible Privacy-Preserving Location Traces. 546-563 - Lucca Hirschi, David Baelde, Stéphanie Delaune:

A Method for Verifying Privacy-Type Properties: The Unbounded Case. 564-581 - Nicolas Papernot, Patrick D. McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:

Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. 582-597 - Anupam Datta, Shayak Sen, Yair Zick

:
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems. 598-617
Vulnerabilities
- Zhen Huang

, Mariana D'Angelo, Dhaval Miyani, David Lie:
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response. 618-635 - Earlence Fernandes, Jaeyeon Jung, Atul Prakash

:
Security Analysis of Emerging Smart Home Applications. 636-654 - Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. 655-674
Don't Go on the Web
- Qi Alfred Chen, Eric Osterweil

, Matthew Thomas, Zhuoqing Morley Mao:
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era. 675-690 - Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis:

Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains. 691-706 - Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan

, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah
:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. 707-723 - Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:

The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information. 724-742 - Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein:

Cloak of Visibility: Detecting When Machines Browse a Different Web. 743-758
Applied Cryptography
- Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:

Verifiable ASICs. 759-778 - Véronique Cortier, David Galindo

, Ralf Küsters, Johannes Müller
, Tomasz Truderung:
SoK: Verifiability Notions for E-Voting Protocols. 779-798 - Rahul Chatterjee, Anish Athayle, Devdatta Akhawe, Ari Juels, Thomas Ristenpart:

pASSWORD tYPOS and How to Correct Them Securely. 799-818 - William C. Garrison III, Adam Shull, Steven A. Myers, Adam J. Lee

:
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud. 819-838 - Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen

, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 839-858
What? You Want More?
- Cristina Basescu, Yue-Hsun Lin, Haoming Zhang, Adrian Perrig:

High-Speed Inter-Domain Fault Localization. 859-877 - Pierre Laperdrix, Walter Rudametkin, Benoit Baudry:

Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints. 878-894 - Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun:

Verena: End-to-End Integrity Protection for Web Applications. 895-913 - Michael Carl Tschantz, Sadia Afroz, anonymous, Vern Paxson:

SoK: Towards Grounding Censorship Circumvention in Empiricism. 914-933
Low-Level Attacks and Defenses
- Victor van der Veen, Enes Göktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat

, Herbert Bos
, Thorsten Holz
, Elias Athanasopoulos, Cristiano Giuffrida
:
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. 934-953 - Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo

, Fabian Monrose, Michalis Polychronakis:
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks. 954-968 - Hong Hu, Shweta Shinde

, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang
:
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. 969-986 - Erik Bosman, Kaveh Razavi, Herbert Bos

, Cristiano Giuffrida
:
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. 987-1004

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














